Lieberman Software enhances privileged access management

  • Published in

Lieberman Software has introduced new capabilities to extend the security and management of privileged credentials for the widest range of devices and platforms in the enterprise – both on premises and in the cloud.

Read More

Almost one-third of cyber security professionals admit to cheating on audits

  • Published in

Over-stretched IT security pros spend more time fire-fighting than doing meaningful security work.

Read More

Gartner identifies security top ten

  • Published in

Gartner has highlighted the top 10 technologies for information security and their implications for security organizations in 2016.

Read More

NEWS

Most organisations not confident in ability to protect data after data breach

  • Published in

69% of IT professionals are not confident their data would be secure if perimeter defenses were breached.

Read More

SailPoint awarded Patent for identity-as-a-service technology

  • Published in

Patented technology maintains ‘zero knowledge’ of administrative credentials in cloud-based identity deployments.

Read More

IAM spending remains buoyant

  • Published in

48 per cent say beating cyber hacking ‘very important’ if digital transformation is to succeed.

Read More

CyberArk has acquired certain assets of privately-held Vaultive, Inc., a cloud security provider.
According to new data from a global snapshot survey from SOTI Inc., more than 60 percent of...
AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...
LogMeIn, Inc. has acquired Ionia Corporation, a system integrator specialising in connected...
Varonis Systems has been added to the U.S. Department of Homeland Security’s and General...
Training platform empowers customer development, increases time-to-productivity.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more