Protecting the flow of sensitive data

ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution with a single interface to help it manage file permissions and security groups. The company’s file shares had grown significantly over time, making it difficult to trace which employees were accessing data ­- and had permission to access what data - across its many departments.

Read More

Intel Security publishes five year threat report

Report provides five-year threat retrospective, GPU malware assessment, and techniques for exfiltrating data from corporate networks; ransomware rises 127% from Q2 2014 to Q2 2015.

Read More

AirGate accesses DDoS protection services

AirGate, provider of Secure Network Services to Canadian enterprises, has begun implementing the Corero SmartWall® Threat Defense System (TDS) to meet customer demands for real-time DDoS mitigation.

Read More


St. Elizabeth Healthcare improves IT security for connected medical devices

SecurityCenter Continuous View allows Northern Kentucky healthcare leader to preserve patient safety by detecting medical device vulnerabilities.

Read More

Staff burnout and a shortage of IT skills could weaken Britain’s defence against attacks on...
Veritas Technologies is warning knowledge workers to ‘think before they share’ sensitive data...
New One Identity Connect for Cloud extends governance and compliance reporting for cloud, hybrid...
STEALTHbits Technologies Inc., a leading supplier of Data Access Governance solutions for...
As enterprises with large on-premise IT infrastructures migrate to the cloud,OneLogin’s new...
Trustwave and Osterman Research have released results of a new study on cybersecurity resource...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more