Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading a drive to help companies understand and overcome the network and security challenges involved in migrating data centres. The company has outlined three key challenges to effective data centre migration faced by businesses - including application connectivity management, security and compliance - and how these can be overcome with the help of Tufin’s Orchestration Suite.

Read More




Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

RSA, a Dell Technologies business, has launched the RSA Risk & Cybersecurity Practice that...
McAfee MVISION Unified Cloud Edge simplifies adoption of SASE architecture and lowers total cost of...
StepStone uses new safety system and cybersecurity awareness training to reduce phishing and...
Fidelis email security for Office 365 ensures email security and compliance with improved...
WhiteHat Security, the web security company, has introduced the rollout of its new WhiteHat...
Disruptive hacking tactics see financial services industry join government as most at risk for DDoS...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more