Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and user identity by intelligently correlating two previously separate sets of data, making it easier for network administrators to locate the source of security events, track mobile devices, monitor network usage and more.

Read More


BMC recognized as a global leader in data privacy and protection

First enterprise IT management company to receive approval for Binding Corporate Rules as both a data controller and a data processor.

Read More


Vectra Networks expands into EMEA

Vectra Networks has completed its initial European business expansion following 12 months of accelerated sales growth and adoption of its innovative Advanced Persistent Threat (APT) solution. Vectra has established a dedicated European presence, with a local headquarters based in Pfaffikon, Switzerland, a logistics hub in Amsterdam and a dedicated European leadership team.

Read More

NEWS

It’s not just what’s on the outside that counts

Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking inside the network for security threats as well as looking out for those trying to get in.

Read More

New report looks at why these low-volume attacks are so costly, and how to protect your business...
Senior hires, including Paul Ayers as General Manager EMEA, and opening of a European HQ will...
Dell has announced key corporate responsibility achievements with the release of its Fiscal Year...
The effect of digital disruption on business has the potential to overturn incumbents and reshape...
FireHost has announced the release of its 2013 year in review Superfecta report (available for...
33% said a malware attack cost on average between £10,000 and £50,000 to remediate,...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more