Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

NEWS

Lessons learned from 2014 – The year of the breach

Michael Aminzade, VP Global Compliance & Risk Services at Trustwave reflects on another year of breaches and discusses what organisations can do to help protect themselves from being attacked.

Read More


Self-encrypting HDDs validated to U.S. Federal Information Processing Standard.
IT decision makers are facing major challenges between dynamic adversaries, significant legislation...
Gartner has highlighted the top 10 technologies for information security and their implications...
Adds support for Android for Work, Chromebooks and secure remote access to Google Compute Engine...
By Mike Hemes, Regional Director, Western Europe, A10 Networks.
Loss of reputation and customer confidence is enterprises’ biggest fear related to data security...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more