AlienVault announces Certification Program

  • Published in

AlienVault has introduced its enhanced AlienVault Certified Security Engineer (ACSE) certification program. AlienVault established the ACSE program to recognize individuals who demonstrate the requisite knowledge and skills in planning, designing, implementing and operating the AlienVault Unified Security Management (USM) platform.

Read More

 Security disconnect between IT and business users

  • Published in

According to new data from a global snapshot survey from SOTI Inc., more than 60 percent of enterprises have experienced a data breach or loss of data. Employees surveyed in the study admit to engaging in mobile device usage behaviors that puts their business' data at risk. More than 73 percent of consumers accessed corporate data from a free or public Wi-Fi connection; nearly 65 percent of consumers forwarded a work document or file to personal email address; and nearly 65 percent used...

Read More

Global Identity Foundation launches quest to develop global digital identity ecosystem

  • Published in

Identity 3.0 solution will keep digital users’ personal details secure and solve IT security problems.

Read More

Infoblox Internal DNS Security 'transforms DNS from a vulnerability into a strength'

  • Published in

Infoblox has introduced Infoblox Internal DNS Security, the most comprehensive solution from a single vendor for securing DNS inside enterprise networks.

Read More

Nuix Launches Incident Response Solution

  • Published in

Nuix has launched Nuix Incident Response, an innovative investigative tool that rapidly delivers deep insights into the cause and scope of data breaches. It harnesses the Nuix Engine’s unique abilities to ingest data natively from hundreds of file types and data formats, adding built-in intelligence to guide incident responders toward the key evidence of internal or external breaches.

Read More

'Seamless, affordable' email compliance and encryption

  • Published in

Hosted email solution adds advanced compliance scanning, management and email encryption.

Read More

Huge demand for security automation driven by the growing number and sophistication of cyber...
Tufin Orchestration Suite R15-2 reduces the attack surface and increases security controls across...
New research highlights a growing reluctance to pay ransomware demands.
One in three UK employees (33%) used personal devices or cloud services to store employer data in...
Programm aus hochkarätigen Experten- und Anwendervorträgen erstmalig um IT-Security...
Thycotic has introduced its PAM Maturity Assessment, the first tool designed as a strategic...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more