Security intelligence tracks “canary in the coal mine” to reduce risk of data loss

Skyhigh Networks has released the next edition of its quarterly Cloud Adoption and Risk Report. The Q4 2015 report, derived from analysis of actual cloud usage across over 23 million employees, uncovers how user behaviours put companies at risk and how catching and managing this behaviour can be the proverbial “canary in the coal mine” in reducing the risk of data loss.

Read More

Intelisecure acquires Pentura

InteliSecure now protects the critical assets of more than 500 enterprise customers worldwide with anticipated 2015 revenues in excess of $35M; forecasts a 50 percent annual sales growth rate in the next three consecutive years.

Read More

NEWS

IT departments face obstacles to user mobility

Organizations are challenged to meet demands for greater mobility as 92% of IT departments worldwide still restrict users from accessing sensitive corporate data and resources from mobile devices. This is according to a recent global survey of 900 IT decision makers by Gemalto, a world leader in digital security. Despite almost all organizations (98%) having users who require mobile or remote access, 95% of IT departments are facing obstacles to increased user mobility in their...

Read More

Dell extends end-to-end security offerings

Continued innovation and integration around security solutions provide customers with industry-leading, end-to-end security capabilities.

Read More

Identity vendor delivers Google for Work support

Adds support for Android for Work, Chromebooks and secure remote access to Google Compute Engine virtual servers in Google Cloud Platform, while delivering deeper Google Apps integration.

Read More

Research reveals 2016's top IT challenges

Global survey of 2,685 IT pros highlights the biggest challenges IT teams face in the battle over the increasing complexity, security threats and importance of mission critical applications and infrastructure.

Read More

The joint offering combines the expertise in Identity and Governance Administration from Omada with...
CyberArk has introduced 'groundbreaking' new capabilities to simplify the continuous discovery and...
A consumer survey commissioned by the Open Data Institute (ODI), and published in advance of the...
Seventy-two percent believe nation-states have right to ‘hack back’ cybercriminals.
Centrify encourages businesses to increase their Identity and Access Management maturity to...
Lack of Artificial Intelligence skills and a smart, connected approach to quality assurance impedes...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more