Chester Zoo protects critical IT infrastructure

Intrusion detection and prevention, and application control, add new level of security and reporting at zoo.

Read More

Priveleged security at Volkswagen

Volkswagen Commercial Vehicles, part of the Volkswagen AG group, has implemented CyberArk’s Privileged Account Security solution to optimise its password management. As part of a security infrastructure project, Volkswagen Commercial Vehicles in Hanover, Germany, has introduced CyberArk’s Privileged Identity & Privileged Session Management suites to manage non-personalised privileged user accounts automatically, ensure compliance with uniform password policies, and maintain a...

Read More

Don’t ignore cyber threats

According to new research conducted by the Department for Business, Innovation & Skills (BIS) with MI5 and GCHQ – only 14 per cent of directors responsible for audit at the FTSE 350 firms regularly consider cyber threats, with a significant number receiving no intelligence at all about cyber criminals.

Read More


The last rites of traditional IT security

Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threat for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date.

Read More


Provides a 360-degree visibility into the threat landscape and protects from malware & ransomware...
Removes obstacles to effective protection, without requiring major infrastructure investments.
Aging laptop and desktop environments and end of life software challenges drive budget...
Zero-install, cloud-ready WatchGuard Dimension instantly distils ‘oceans of security...
Elitetele.com has introduced a suite of unified threat management (UTM) solutions, including next...
Menlo Security has published its State of The Web 2016 report.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more