Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and user identity by intelligently correlating two previously separate sets of data, making it easier for network administrators to locate the source of security events, track mobile devices, monitor network usage and more.

Read More


BMC recognized as a global leader in data privacy and protection

First enterprise IT management company to receive approval for Binding Corporate Rules as both a data controller and a data processor.

Read More


Vectra Networks expands into EMEA

Vectra Networks has completed its initial European business expansion following 12 months of accelerated sales growth and adoption of its innovative Advanced Persistent Threat (APT) solution. Vectra has established a dedicated European presence, with a local headquarters based in Pfaffikon, Switzerland, a logistics hub in Amsterdam and a dedicated European leadership team.

Read More

NEWS

It’s not just what’s on the outside that counts

Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking inside the network for security threats as well as looking out for those trying to get in.

Read More

The UK Cyber Security Forum (UKCSF), the umbrella organization for the internationally renowned...
TeamQuest has announced the results of their Global IT Management survey with indicators on how IT...
CybSafe, the behavioural security platform that’s transforming the way organisations manage human...
ELSEN Group, a German logistics and personnel service provider, sought out a transparent solution...
By Russell Horton, COO at Elitetele.com examines the importance of securing your business against...
Identity and personal data theft account for 64% of all data breaches.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more