OneLogin enhances its cloud-based IAM solution

  • Published in

As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new hybrid capabilities ensure that the legacy IT is not left behind.

Read More

Cybersecurity Threat Landscape - 2016 predictions

  • Published in

The year 2015 has become widely referred to as the year of the data breach. What nefarious cyber-acts will define 2016? For the first time as a newly combined company, Raytheon|Websense cybersecurity experts has shared security predictions for the coming year. Researchers suggest to be on the lookout for:U.S. presidential election cyber-antics; cybercriminals pickpocketing the wallet on your phone; and an increase in vulnerabilities from the aging Internet, among other...

Read More

NEWS

Security concerns will drive SMEs to cloud in 2016

  • Published in

Cloud adoption will continue to rise next year as concerns over security remain.

Read More

Enhanced security is top IT investment driver

  • Published in

Businesses focused on ensuring data is kept secure and resilient as they gear up for growth.

Read More

Security is security is security

  • Published in

Some security predictions for next year from Chris Pace, head of product marketing, Wallix.

Read More

Cyber security is low priority for UK

  • Published in

Despite eight out of ten IT decision makers experiencing a data or cyber security breach in their organisation in 2015, less than one-third plan to invest in cyber security technologies in 2016.

Read More

Business leaders are becoming increasingly conscious of the impact cybersecurity can have on...
Data security concerns call for a multi-faceted approach to protecting an organisation’s...
Splunk has selected Ping Identity to provide its customers with simple and secure access to the...
Research suggests UK companies will be using IT services providers the most to overcome hurdles in...
The year 2015 has become widely referred to as the year of the data breach. What nefarious...
Pulse Secure NAC mitigates endpoint visibility, compliance and IoT security risks.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more