Logo
NEWS

Five key IT security trends for 2015

  • Published in

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at five key IT security trends and solutions for 2015.

Read More

NEWS

Security fears stop firms using cloud computing services

  • Published in

New research from the Federation of Small Businesses (FSB) has found that despite three fifths (60%) of small firms questioned using cloud computing services, the remaining two fifths (38%) remain sceptical about the benefits of the technology in the face of perceived risks.

Read More

 Privileged Identity Management for Big Data

Centrify Corporation has launched what it says is the industry’s first privileged identity management solution for Apache Hadoop-based big data infrastructures, as well as partnerships with industry-leading big data vendors Cloudera, Hortonworks and MapR Technologies. 

Read More

Check Point acquires Hyperwise

  • Published in

Acquisition of stealth-mode start-up enhances threat prevention portfolio to stop attacks before they happen.

Read More

Wick Hill gains Cyber certification

  • Published in

Wick Hill has gained the recently launched Government Cyber Essentials certification. The Cyber Essentials Scheme is part of the UK Government’s National Cyber Security Strategy and provides an independent assessment of the essential security controls that organisations need to have in place to mitigate risks from internet-borne threats.

Read More

NEWS

Digital Guardian launches Digital Guardian 7.0 for data protection 'inside and out'

  • Published in

Digital Guardian has launched Digital Guardian 7.0, which extends the functionality of the patented Digital Guardian Agent to protect against advanced threats. The extension of Digital Guardian’s data protection capabilities comes with a redesign of the product architecture for ease of deployment for use cases ranging from data visibility and device control to indicator of compromise (IOC) detection and incident response.

Read More

Future Market Insights (FMI) recently published a market research report, titled, Identity & Access...
When FrieslandCampina, one of the world’s leading dairy cooperatives, needed a new...
Risk-based authentication hinders threat actors while streamlining user experience.
Thales’s Gemalto Identity Verification Suite (IDV) minimizes ID fraud risks by verifying document...
Integration provides safe journey to the cloud by enabling customers to use RSA SecurID®...
Thycotic has released the findings from its 2018 VMworld survey of more than 250 IT operations...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more