Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading a drive to help companies understand and overcome the network and security challenges involved in migrating data centres. The company has outlined three key challenges to effective data centre migration faced by businesses - including application connectivity management, security and compliance - and how these can be overcome with the help of Tufin’s Orchestration Suite.

Read More




Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

Infoblox 3.0 delivers secure, cloud-first network experiences by unifying NIOS and BloxOne...
A new SolarWinds survey of IT professionals explores the current state of security preparedness...
Just 3% of organizations have real-time visibility into runtime vulnerabilities, as multicloud...
Award-winning mobile casino doesn’t gamble on security.
With 81% of employees now accessing documents outside the office, companies must provide a safe way...
BreakingPoint Cloud delivers realistic attack simulations and quantifiable test results to...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more