Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and user identity by intelligently correlating two previously separate sets of data, making it easier for network administrators to locate the source of security events, track mobile devices, monitor network usage and more.

Read More


BMC recognized as a global leader in data privacy and protection

First enterprise IT management company to receive approval for Binding Corporate Rules as both a data controller and a data processor.

Read More


Vectra Networks expands into EMEA

Vectra Networks has completed its initial European business expansion following 12 months of accelerated sales growth and adoption of its innovative Advanced Persistent Threat (APT) solution. Vectra has established a dedicated European presence, with a local headquarters based in Pfaffikon, Switzerland, a logistics hub in Amsterdam and a dedicated European leadership team.

Read More

NEWS

It’s not just what’s on the outside that counts

Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking inside the network for security threats as well as looking out for those trying to get in.

Read More

Fellows help Ponemon educate global organisations on improving data protection initiatives.
60% of security professionals say spend on information security is not keeping pace with growing...
Continues 2014 momentum to establish security intelligence firm as a market leader in the region.
Rangu Salgame, Chief Executive Officer of Growth Ventures at Tata Communications, discusses the...
Research from Avast has found that employees in almost a third (31%) of Small and Medium...
New Reference Architecture provides validated blueprints for implementing comprehensive web...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more