iStorage enters Japanese market with award winning product range

Tokyo based NewGen Technology, Inc. to make unique USB flash and portable hard drives with PIN code access and hardware encryption available in Japan and Asia/Pacific.

Read More

‘Unprecedented’ growth of advanced attacks and malicious traffic

The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels. According to the report, a worldwide shortage of nearly a million skilled security professionals is impacting organizations’ abilities to monitor and secure networks, while overall vulnerabilities and threats reached their highest levels since 2000.

Read More

Telenor Norway improves network visibility and security with StealthWatch

Telenor’s service portfolio in Norway includes fixed and mobile telephony, broadband and data communication services for residential and business customers, as well as a broad range of wholesale services. With more than 150 years of history as a pioneer in telecom services, Telenor Norway today boasts approximately 5.5 million customer accounts.

Read More

Addressing public and private security challenges

Juniper Networks has unveiled Firefly Suite, a virtualised security portfolio that provides granular, dynamic and secure connectivity for the private and public cloud. The suite introduces Firefly Perimeter, a virtual version of the Juniper Networks® SRX Series Services Gateway, as well as Junos® Space Virtual Director, an application that automates the management and deployment of Firefly Perimeter. When combined with enhancements to Firefly Host, which provides hypervisor-based...

Read More

Palo Alto Networks ‘raises the bar’

Palo Alto Networks has announced enhancements to its enterprise security platform that increase advanced threat detection and prevention capabilities for its customers worldwide. Most significantly, this includes enhancements to the Palo Alto Networks WildFire™ service that enable quick discovery and elimination of previously unknown malware, zero-day exploits, and advanced persistent threats (APTs).

Read More

Becrypt and Motion Computing strengthen UK partnership

New technology agreement set to deliver latest, robust PC tablets for police and emergency services.

Read More

RiskIQ has released its annual "Evil Internet Minute" security intelligence report. The report taps...
Easy to follow staff education and training toolkit on data security issues.
BlackBerry has released the 2021 BlackBerry Threat Report, detailing a sharp rise in cyberthreats...
Nearly one-third (32%) of IT group employees in SMBs and mid-market enterprises globally said their...
Risk-based authentication hinders threat actors while streamlining user experience.
Thales announces the publication of its latest 2013 Global Encryption Trends Study. The report,...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more