AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat intelligence capabilities.

Read More

Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity....

Read More

NetIQ launches advanced access and authentication solutions

Enterprises leverage the power of identity to deliver simple user access to sensitive information and reduce risk.

Read More


Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

CA Technologies has released significant enhancements to its comprehensive privileged access...
Nearly half of office workers have been afforded unfettered access to sensitive company data.
New research from email security firm Tessian reveals why people make mistakes, how blurred lines...
Featuring on-premises, controllable enterprise proxy to securely monitor and process automated...
Netwrix survey reveals that 33% of financial organisations discovered sensitive data in insecure...
Enterprises average 1,555 partners, and 30% of data shared is with high risk partners.
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more