Infoblox bridges the gap between network security and user identity

Infoblox has launched Infoblox Identity Mapping, which bridges the gap between network security and user identity by intelligently correlating two previously separate sets of data, making it easier for network administrators to locate the source of security events, track mobile devices, monitor network usage and more.

Read More


BMC recognized as a global leader in data privacy and protection

First enterprise IT management company to receive approval for Binding Corporate Rules as both a data controller and a data processor.

Read More


Vectra Networks expands into EMEA

Vectra Networks has completed its initial European business expansion following 12 months of accelerated sales growth and adoption of its innovative Advanced Persistent Threat (APT) solution. Vectra has established a dedicated European presence, with a local headquarters based in Pfaffikon, Switzerland, a logistics hub in Amsterdam and a dedicated European leadership team.

Read More

NEWS

It’s not just what’s on the outside that counts

Chris Marrison, consulting solutions architect at Infoblox, discusses the importance of checking inside the network for security threats as well as looking out for those trying to get in.

Read More

The new applications will enable organisations to achieve and maintain compliance with the EU...
Alert Logic has announced the availability of Alert Logic ActiveWatch for Log Manager, a managed...
Metallic Data Management-as-a-Service (DMaaS) adds advanced security insights and capabilities...
In addition, 27% of educational organisations suffered a ransomware attack, and 49% of them needed...
New solutions streamlines security and configuration policy into unified authorisation and...
Global cyber and information security experts, ThinkMarble, is launching a Virtual Data Protection...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more