VMware 'transforms' Hybrid Cloud security for mobile users

VMware says that it is transforming hybrid cloud security for mobile end users through the combination of VMware NSX(TM) network virtualization and the company's business mobility solutions, AirWatch® by VMware and VMware Horizon®.

Read More

AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat intelligence capabilities.

Read More

Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity....

Read More



Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

Report by Trend Micro identifies London’s ‘blackspots’ where data is at risk to...
Symantec expects to receive approximately $6.3 billion in net cash proceeds.
New report from SolarWinds MSP outlines a huge opportunity for service providers, with half of...
Radware has released its 2017-2018 Global Application and Network Security Report, which found...
Damballa and Bit9® + Carbon Black® have announced a partnership and technology integration...
2020 (ISC)2 Cybersecurity Workforce Study chronicles the resiliency, outlook and perseverance of...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more