Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and user identity by intelligently correlating two previously separate sets of data, making it easier for network administrators to locate the source of security events, track mobile devices, monitor network usage and more.

Read More


BMC recognized as a global leader in data privacy and protection

First enterprise IT management company to receive approval for Binding Corporate Rules as both a data controller and a data processor.

Read More


Vectra Networks expands into EMEA

Vectra Networks has completed its initial European business expansion following 12 months of accelerated sales growth and adoption of its innovative Advanced Persistent Threat (APT) solution. Vectra has established a dedicated European presence, with a local headquarters based in Pfaffikon, Switzerland, a logistics hub in Amsterdam and a dedicated European leadership team.

Read More

NEWS

It’s not just what’s on the outside that counts

Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking inside the network for security threats as well as looking out for those trying to get in.

Read More

Trustwave has announced new and enhanced managed security services designed to help businesses...
Boldon James delivers data classification to drive DLP solution and prevent data loss incidents.
LogMeIn has published results of a global study executed by IDG that reveals the new reality of...
Programm aus hochkarätigen Experten- und Anwendervorträgen erstmalig um IT-Security...
Global technology provider Arrow Electronics has signed a pan-European distribution agreement with...
ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more