AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to support more organizations in staying ahead of emerging attacks. As part of the effort, HP intends to integrate data from AlienVault Open Threat Exchange (OTX) into HP Threat Central, its cloud-based threat intelligence sharing and analysis platform. 

Read More

FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of Security Manager 8.0. Leveraging highly automated analysis and monitoring of security infrastructure, Security Manager 8.0 delivers previously unavailable capabilities to identify and resolve emerging gaps in network defence.

Read More

Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account management and vulnerability management leader

Read More


Security, reliability and customer service matter most

Managed services providers (MSPs) are more focused than ever on managing endpoints and using remote monitoring and management (RMM) solutions to increase visibility and scale to meet the ongoing demands of managing cloud-based solutions, according to a new Autotask survey of MSPs.

Read More

Only 15% of IT Decision Makers (ITDM) report having HCI as part of their infrastructure, citing...
A consumer survey commissioned by the Open Data Institute (ODI), and published in advance of the...
According to Venafi study, machine identity related cyberattacks grew by more than 400% between...
WALLIX has appointed Kristine Kirchner as Vice President of Channel in EMEA. Kirchner was...
Over one-third of global finance CIOs acknowledge organizations experienced an outage in the last...
A recent survey from SailPoint Technologies Holdings illustrates the ongoing struggle that IT...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more