10 Networks launches standalone Thunder SSL Insight (SSLi) line of products

A10 Networks has launched the Thunder SSL Insight (SSLi), a standalone security product built on A10’s market-leading SSL inspection technology and ACOS Harmony platform.

Read More
Check Point unveils management platform

New R80 security platform helps organizations to better consolidate processes, policies and technology for smarter, more proactive protection.

Read More
Improving incident response effectiveness

CyberArk has introduced new real-time threat detection and containment capabilities to help organisations secure against cyber attacks targeting Microsoft Active Directory infrastructure. Compromising Active Directory empowers attackers to take control of the business.

Read More
Trustwave appoints Chief Operations Officer

Trustwave has appointed security industry veteran Rick Miller as Chief Operations Officer, a newly created role that leads the company’s portfolio of professional, delivery and managed services.

Read More
Tenable Network Security launches Technology Integration Partner Program

Tenable levels-up its global technology integrations program with launch partners Amazon Web...

Read More
Focusing on IaaS security

The Cloud Security Alliance (CSA) has announced the formation of a new SDP for Infrastructure as...

Read More
Enabling secure access for hybrid IT environments

Pulse Secure has introduced new solutions to allow enterprises to embrace cloud delivered apps...

Read More
Enabling IoT applications and deployments

Barracuda has expanded its NextGen Firewall product family with the new Barracuda NextGen...

Read More
Immune system fights back

Darktrace has launched Darktrace Antigena, a ground-breaking new product that uses machine...

Read More
NEWS
Turning security intelligence into protection

Companies need more than endpoint protection to stay secure in an increasingly complex...

Read More
Privileged security

Bomgar Vault helps companies secure, manage, and administer shared credentials for privileged users...

Read More
IoT encryption and authentication

Cryptosoft to leverage Symantec’s Roots of Trust and device certificates to secure IoT devices.

Read More
Advancing sandboxing beyond threat detection

Industry-first, multi-engine approach to advanced threat analysis—that also supports...

Read More
Ensuring email security and compliance

Fidelis email security for Office 365 ensures email security and compliance with improved...

Read More
How well does your business or organisation look after customers’ personal information?

Data breaches, cyber security, identity theft - recently the news has been full of stories...

Read More

Videos

James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...
Dor Eisner, Co-Founder and CEO of Guardz, shares insights from the latest Cybersecurity SMB Report. He discusses the evolving threat landscape, including the impact of AI and automation, and why smaller...
In this interview, Dave Baggett, SVP/GM Security Suite at Kaseya, discusses how MSPs can tackle rising complexity, manage vendor sprawl, and stay ahead of high-impact incidents. We explore Kaseya’s unified...
James Netherwood, Head of Research Middle East, Capacity and Datacloud, discusses the upcoming Capacity Middle East event and the launch of Datacloud Middle East. The events unite over 3,500 executives from...

Expert Opinions

By Mala Pillutla, Vice President of Sales for Log Management, Dynatrace.
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Derek Thompson, Senior VP & GM, EMEA, Workato.