NEWS

ExtraHop partners with CrowdStrike

ExtraHop has formed a partnership with CrowdStrike, a leader in cloud-delivered endpoint protection. The partnership includes the powerful integration between ExtraHop® Reveal(x) and CrowdStrike Falcon®, marrying best-of-breed cloud-native detection and response capabilities to provide protection from the network to the endpoint.

Read More

NEWS

WatchGuard Technologies completes acquisition of Panda Security

WatchGuard partners to realise immediate value from Panda Security’s advanced endpoint detection and response solution through the Panda Security Early Access Program.

Read More

NEWS

Arrow Electronics secures Pan-European distribution agreement with Centrify

Global technology provider Arrow Electronics has formed a Pan-European distribution agreement with cyber security specialist Centrify, which covers its entire portfolio of Identity-Centric Privileged Access Management (PAM) solutions.

Read More

NEWS

Thycotic acquires Onion ID

Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, has acquired PAM solution provider Onion ID.

Read More

NEWS

Data security is a key priority

LastPass by LogMeIn has released findings of a new report conducted in partnership with Vanson Bourne to understand how IT and security professionals across a variety of industries including finance, IT and media are managing their identity and access management (IAM) programmes. The findings reveal that IAM priorities differ by industry vertical, emphasising how a one-size-fits-all approach to IAM doesn’t work when every industry and business within that industry is unique.

Read More

NEWS

Zscaler acquires Edgewise Networks

Zscaler has acquired Edgewise Networks, a pioneer in securing application-to-application communications for public clouds and data centres. Edgewise Networks significantly improves the security of east-west communication by verifying the identity of application software, services and processes to achieve a zero trust environment which measurably reduces the attack surface and lowers the risk of application compromise and data breaches.

Read More

F-Secure finds IoT threats and attacks are increasing, but rely on well-known security weaknesses.
Synopsys has released its report, “The State of Software Composition 2017,” which analyses...
HackerOne has released The 2022 Attack Resistance Report that captures IT professionals’...
NETSCOUT SYSTEMS has released its 2018 NETSCOUT Threat Intelligence Report, offering...
Zero Trust Networking blocks unauthorized devices and users from corporate data access.
IT channel partners selling managed services are poised for robust growth in 2023, with a new...
Latest Video

Case Study: @nifty Delivering IT Security to Their Customers with Kaspersky

NIFTY Corporation is one of the leading Telecoms and Internet Service Providers in Japan, supplying high-speed broadband connectivity to more than 1.39 million broadband users. Providing robust security for the many subscribers to its online services is very important because repeated security breaches or loss of service may result in customers suffering damage or losses - and ultimately leaving NIFTY and moving to competitors' services.

Read more