Making intelligence driven security a reality

ThreatStream has changed the company name to Anomali and launched two new products.

Read More

Fortinet launches Cyber Threat Assessment Program

Analysis of enterprises piloting the program shows that social media and application control demand great vigilance, while banks are favorite targets.

Read More

Cross-Cloud visibility and data protection

Cloud Security Broker delivers 360-degrees user behaviour analytics, threat detection, compliance controls and encryption across a wide range of applications through cloud APIs.

Read More

Endpoint protection built for Linux Servers

Platform combines best-in-class detection, prevention and remediation against sophisticated malware and exploit-based attacks.

Read More

Gemalto expands data protection ecosystem

Enterprises can seamlessly protect data and secure access to hundreds of IT applications, products and cloud services with Gemalto's industry-leading authentication, encryption and key management solutions.

Read More

Extending network forensics

Savvius has released Savvius Vigil 2.0™, a powerful new version of the innovative security appliance that combines intelligent packet capture with long-term storage, allowing organizations to accelerate breach incident response and resolution.

Read More

Insight research highlights growing importance of IT in the workplace with 8 in 10 business...
2021 BYOD Security Report reveals security teams continue to lack visibility and technology needed...
New program addresses the increased demand for advanced data-security solutions for...
Weaponisation of DDoS sees British companies impacted lose average of £140,000 due to DDoS...
Continues to be the must-attend pan-European event for storage, virtualisation, big data, cloud and...
A cluster of companies in the UK’s Severn Valley have been identified in the latest search...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more