Check Point introduces high-end 41000 security system

Uses multi-blade hardware architecture to deliver scalable security with high reliability.

Read More

DOSarrest releases latest generation DDoS Mitigation System Software

DOSarrest has just released its latest generation of proprietary backend software that incorporates an all-new customer-facing portal. This new release will enable DOSarrest to implement changes to customer configurations in seconds, enabling them to apply custom made DDoS mitigation modules extremely quickly. It is also equipped with an Intrusion Detection System (IDS), allowing the security team to pinpoint sophisticated layer 7 attacks as well as provide cloud based Web Application Firewall...

Read More



Tripwire launches NERC Alliance Network

Tripwire, Inc. has introduced the NERC Alliance Network, an expansion of its Technology Alliance Partner (TAP) program and NERC Solution Suite.

Read More

McAfee outlines strategy for connected network security

McAfee, part of Intel Security, has outlined its strategy for helping businesses and government agencies strengthen their network protection through a powerful combination of integrated technologies. As part of its strategy, McAfee is strengthening its network portfolio with deeper integration and expanded use of both global and local threat intelligence.

Read More

Two leaders bring together the best of both worlds; developer speed and enterprise security.
Leaders increase their security response effectiveness through automating security tasks and...
Three quarters of UK businesses plan to increase IT budget next year, with 62% identifying security...
New service neutralizes cyber-threats attached to suspicious files.
Cylance and Lidera Network to offer a revolutionary cybersecurity solution that protects...
Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more