Over two thirds of IT professionals say they need to invest in new technologies or services to help prepare their business for the impact of GDPR.
Read MoreCertes Networks says that its CryptoFlow product suite now protects enterprise applications in Software-Defined WAN deployments and in public and hybrid Cloud environments.
Read MoreCorero Network Security has published the findings of its Trends and Analysis Report for the first half of 2015. Analyzing customer data, Corero found that attackers are continuing to leverage sub-saturating DDoS attacks with increasing frequency, using shorter attack durations to evade legacy cloud DDoS scrubbing solutions to cause network disruptions and, in some cases, distract victims while other malware infiltrates networks and steals customer information and corporate data.
Read MoreThe Ponemon Institute and Venafi have released new data from the 2015 Cost of Failed Trust Report, on the inherent risk and direct business impact from unsecured cryptographic keys and digital certificates on Global organizations.
Read MoreStrategic alliance combines advanced application delivery technologies with sophisticated threat management for applications and data centers; unifies customer engagement and solution deployment worldwide.
Read MoreSkyhigh Pervasive Cloud Control enables Mobile-to-Cloud visibility and policy enforcement.
Read More