Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers

  • Published in

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo, enabling it to offer customers of its offshore cloud a powerful sync and share service with full end-to-end encryption.

Read More

NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement

  • Published in

NTT Com Security and Palo Alto Networks have entered into a global managed security services agreement. Under the terms of the agreement, NTT Com Security (formerly Integralis) will provide its extensive implementation, integration, and managed security services around the Palo Alto Networks security platform.

Read More

Lessons learnt from blocking millions of cyber attacks

  • Published in

FireHost has announced the release of its 2013 year in review Superfecta report (available for download here link and by request). Using real-life data from the 100m+ malicious hack attempts FireHost blocked in the last 12 months, the Superfecta report contains a quarter-by-quarter guide to the biggest cybercrime trends and incidents in 2013, including expert analysis from both FireHost’s IT security teams and partners.

Read More

DNA to detect pass-the-hash vulnerabilities

  • Published in

CyberArk has unveiled the latest version of Discovery & Audit (DNA), said to be the first tool on the market to identify and map exposed privileged password hashes and all related vulnerable machines on a network. CyberArk DNA is a patent-pending, light-weight, stand alone tool that exposes the magnitude of privileged account security risks by enabling organisations to easily identify and analyse all privileged accounts across their network. CyberArk DNA v4 free trial licenses are currently...

Read More

Bit9 partners with Check Point Software Technologies

  • Published in

Bit9 and Check Point® Software Technologies Ltd. has announced a partnership to integrate the combined Bit9 and Carbon Black real-time endpoint and server security solution with Check Point’s next-generation firewall and threat emulation offerings.

Read More

More than 575 million data records lost or stolen in 2013

  • Published in

Over 1.5 million data records were lost or stolen every day in 2013.

Read More

Research finds high frequency of compromised credentials in enterprises, putting corporate data at...
Remote workers pose huge threat as more than half of surveyed organisations predict they will...
Cylance, the company that is using artificial intelligence to proactively prevent advanced...
New partnership extends Becrypt’s international footprint, opening up new markets in the USA.
Survey of IT decision makers collectively managing more than 250,000 users finds that as the...
New Check Point all-inclusive 23900 appliance delivers maximum protection against...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more