Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading a drive to help companies understand and overcome the network and security challenges involved in migrating data centres. The company has outlined three key challenges to effective data centre migration faced by businesses - including application connectivity management, security and compliance - and how these can be overcome with the help of Tufin’s Orchestration Suite.

Read More




Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the...
Companies face regulatory fines and cybersecurity threats yet fail to protect their sensitive data,...
By Robert Doswell, managing director of Tools4ever UK, a global provider of identity and access...
NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...
Cloud-native security customized to the demand of DevOps to protect and scale environments.
Response and recovery have significant impact on 58% of targeted businesses.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more