Lancope launches ProxyWatch

  • Published in

New solution extends network visibility to both sides of a proxy conversation for advanced threat protection.

Read More

Cavium introduces LiquidSecurity

  • Published in

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete Hardware Based Transaction Security Solution. The LiquidSecurity™ HSM family provides a FIPS 140-2 level 2 and 3 partitioned, centralized and elastic key management solution with the highest transaction/sec performance. It addresses the high performance security requirements for private key management and administration while also addressing elastic performance per virtual / network domain...

Read More

Black Hole Routing does not equate to DDoS protection

  • Published in

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More


Security Intelligence Platform for Sanctioned Cloud Services

  • Published in

Skyhigh Networks has introduced its Security Intelligence Platform for Sanctioned Cloud Services. The new offering is built on a canonical Cloud API Engine that enables rapid detection and response on a single platform for security, compliance, and data governance across all sanctioned cloud services such as Salesforce, Box, Microsoft Office 365, ServiceNow, Jive, Workday, Google for Work, and Dropbox for Business.

Read More

DevSecOps: Taking a DevOps approach to security

  • Published in

By James Brown, Director, Cloud Solutions Architecture.

Read More

CryptoLocker attack shows why SMEs need to protect themselves now more than ever, says Databarracks.
By Sean Newman, security strategist, Cisco Security Business Group.
Virtual learning platform provides easily accessible cyber war scenarios that...
Arbor Networks has released its 12th Annual Worldwide Infrastructure Security Report...
Solution gives customers a fast and secure way to verify identity while reducing fraud.
Today marks the release of our fourth annual Businesses @ Work Report, which takes an in-depth...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more