Palo Alto Networks and VMware extend partnership

  • Published in

Palo Alto Networks® and VMware, Inc. have extended the companies’ strategic partnership with the announcement of a new reseller agreement and the general availability of a previously announced integrated network security and network virtualization solution.

Read More

Juniper adds intrusion deception on the firewall

  • Published in

Juniper Networks has announced Juniper Argon Secure, an advanced anti-malware service for Juniper Networks® SRX Series Services Gateways to identify malware that traditional solutions cannot detect. Building on Juniper’s success using Intrusion Deception to prevent attacks against web applications, Argon Secure applies the technology to both networks and endpoints to detect malware at multiple points in the attack process. This added level of protection is a critical step in building...

Read More

Majority of UK companies now view cyber threat as a top 3 business risk

  • Published in

90% of British businesses surveyed expect the number of cyber attacks to increase.

Read More

Thales announces support for F5 Synthesis Architecture

  • Published in

F5 BIG-IP support for Thales hardware security modules offers customers highest levels of security and reduces risk.

Read More

Dell Software expands Dell One Identity

  • Published in

Integration of Dell’s identity governance and privileged management solutions provides a complete offering that governs access for all users, regardless of their role or the level of access they need.

Read More

Check Point introduces Software-defined Protection security architecture

  • Published in

‘Revolutionary’ security blueprint powered by collaborative intelligence.

Read More

Despite 80% of organisations running up to 10 different protection and cybersecurity solutions...
The cost of recovering from of a security breach for UK organisations has been estimated in a new...
FireEye, Inc. has announced the release of a report titled, “World War C: Understanding...
Partnership will help accelerate adoption of AlgoSec’s Security Policy Management Suite in...
Around 60% of BYOD workers do not involve their company IT support in setting up their devices
But staffing obstacles hamper SIEM implementations.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more