Gemalto joins the European Network for Cyber Security

  • Published in

Brings digital security expertise to secure European critical energy grids and infrastructure.

Read More

Security intelligence tracks “canary in the coal mine” to reduce risk of data loss

  • Published in

Skyhigh Networks has released the next edition of its quarterly Cloud Adoption and Risk Report. The Q4 2015 report, derived from analysis of actual cloud usage across over 23 million employees, uncovers how user behaviours put companies at risk and how catching and managing this behaviour can be the proverbial “canary in the coal mine” in reducing the risk of data loss.

Read More

Intelisecure acquires Pentura

  • Published in

InteliSecure now protects the critical assets of more than 500 enterprise customers worldwide with anticipated 2015 revenues in excess of $35M; forecasts a 50 percent annual sales growth rate in the next three consecutive years.

Read More

NEWS

IT departments face obstacles to user mobility

  • Published in

Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources from mobile devices. This is according to a recent global survey of 900 IT decision makers by Gemalto, a world leader in digital security. Despite almost all organizations (98%) having users who require mobile or remote access, 95% of IT departments are facing obstacles to increased user mobility in their...

Read More

Dell extends end-to-end security offerings

  • Published in

Continued innovation and integration around security solutions provide customers with industry-leading, end-to-end security capabilities.

Read More

Identity vendor delivers Google for Work support

  • Published in

Adds support for Android for Work, Chromebooks and secure remote access to Google Compute Engine virtual servers in Google Cloud Platform, while delivering deeper Google Apps integration.

Read More

AlienVault has introduced its enhanced AlienVault Certified Security Engineer (ACSE) certification...
Janrain and Akamai Technologies have partnered to provide Janrain Secure Edge, bringing new...
More than three-quarters (88%) of hackers can break through cybersecurity defences and into the...
Jumio Authentication enables users to verify themselves during high-risk transactions and unlock...
40% of firms expect an insider data breach in the next 12 months.
OPSWAT acquires Red Earth Software, extending its advanced threat prevention technology to protect...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more