RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect identities from the endpoint to the cloud.

Read More

RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the ability for customers to leverage existing storage investments.

Read More

BT puts CA Technologies Identity and Access Management Software at the core of its Cloud Identity Service

CA Technologies and BT have revealed that CA Secure Cloud, CA’s identity and access management (IAM) solution for managed service providers, has been integrated into BT’s new managed identity service, BT Assure Cloud Identity. BT’s service helps protect business data wherever it’s located – in the cloud, on-premise or in hybrid IT systems – using the enterprise-grade IAM capabilities within CA Secure Cloud paired with BT’s extensive managed security...

Read More

2 out of 3 IT pros put systems at risk of downtime and security violations

Netwrix 2015 State of IT Changes Survey reveals that nearly 70% of organisations continue to make undocumented changes and only 50% audit their IT infrastructures.

Read More

HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of Voltage Security, a leading provider of high performance tokenization and encryption. With the introduction of the new HP Cloud Access Security Protection platform, HP has now partnered with cloud access security broker Adallom to bring enhanced cloud security monitoring, governance and control capabilities to the portfolio.

Read More

Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The survey was conducted to determine how organizations are implementing network access control (NAC) policies and security solutions to address today’s environments, given the proliferation of cybercrimes and growing concerns over insider threats.

Read More

80 percent of organisations report employee misuse or abuse of access to business applications.
Half of CISOs say their organisation’s desire for growth and rapid digitalisation is detrimental...
Gemalto has deployed its Coesys eGov Authentication Server in Singapore, which provides...
Only 12% of chief information security officers (CISOs) excel in all four categories of the Gartner...
By 2022, Gartner, Inc. predicts that 70 per cent of organisations using biometric authentication...
Post-lockdown recovery threatened for businesses vulnerable to increasing rate of cyberattacks...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more