BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

  • Published in

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access management (IAM) solution for managed service providers, has been integrated into BT’s new managed identity service, BT Assure Cloud Identity. BT’s service helps protect business data wherever it’s located – in the cloud, on-premise or in hybrid IT systems – using the enterprise-grade IAM capabilities within CA Secure Cloud paired with BT’s extensive managed security...

Read More

2 out of 3 IT pros put systems at risk of downtime and security violations

  • Published in

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make undocumented changes and only 50% audit their IT infrastructures.

Read More

RSA ujnveils Via family of smart identity solutions

  • Published in

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect identities from the endpoint to the cloud.

Read More

RSA Security Analytics extends visibility from the endpoint to the Cloud

  • Published in

New pricing and packaging options including throughput-based pricing, subscription services and the ability for customers to leverage existing storage investments.

Read More

HP launches Cloud access security platform

  • Published in

HP’s commitment to data-centric security was demonstrated by its recent acquisition of Voltage Security, a leading provider of high performance tokenization and encryption. With the introduction of the new HP Cloud Access Security Protection platform, HP has now partnered with cloud access security broker Adallom to bring enhanced cloud security monitoring, governance and control capabilities to the portfolio.

Read More

Organisations continue to rely on outdated access controls

  • Published in

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The survey was conducted to determine how organizations are implementing network access control (NAC) policies and security solutions to address today’s environments, given the proliferation of cybercrimes and growing concerns over insider threats.

Read More

Survey of more than 1,000 IT security professionals reveals widespread lack of confidence in access...
Centrify-commissioned study reveals IT practitioners most concerned about losing jobs.
Nearly half of senior executives not aware of what their company insurance covers them for.
Blue Coat Systems, Inc. has acquired Norman Shark, the global leader in malware analysis solutions...
Manx Telecom deploys Radware’s DefensePro to help protect its networks on the Isle of Man.
Global research survey discovers that 65% of respondents experience buyers’ remorse after closing...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more