Logo

Lancope launches ProxyWatch

  • Published in

New solution extends network visibility to both sides of a proxy conversation for advanced threat protection.

Read More

Cavium introduces LiquidSecurity

  • Published in

Cavium has introduced the LiquidSecurity™ Hardware Security Module (HSM) Family, a complete Hardware Based Transaction Security Solution. The LiquidSecurity™ HSM family provides a FIPS 140-2 level 2 and 3 partitioned, centralized and elastic key management solution with the highest transaction/sec performance. It addresses the high performance security requirements for private key management and administration while also addressing elastic performance per virtual / network domain...

Read More

Black Hole Routing does not equate to DDoS protection

  • Published in

By Stephen Gates, Chief Security Evangelist for Corero Network Security.

Read More


Security Intelligence Platform for Sanctioned Cloud Services

  • Published in

Skyhigh Networks has introduced its Security Intelligence Platform for Sanctioned Cloud Services. The new offering is built on a canonical Cloud API Engine that enables rapid detection and response on a single platform for security, compliance, and data governance across all sanctioned cloud services such as Salesforce, Box, Microsoft Office 365, ServiceNow, Jive, Workday, Google for Work, and Dropbox for Business.

Read More

DevSecOps: Taking a DevOps approach to security

  • Published in

By James Brown, Director, Cloud Solutions Architecture.

Read More

Nearly 30% of employees are using personal cloud services to store work-related documents,...
Cyber Essentials implementation needs complementary standards, delegates are told.
Nuix, a company that protects, informs, and empowers society in the knowledge age, today promoted...
Extended range of gateways delivers award-winning automated threat prevention and integrated...
McDonald to leverage over 25 years of proven software engineering expertise to lead a highly...
Company raises $38.25M to fuel explosive growth as enterprises race to protect themselves.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more