Check Point introduces high-end 41000 security system

Uses multi-blade hardware architecture to deliver scalable security with high reliability.

Read More

DOSarrest releases latest generation DDoS Mitigation System Software

DOSarrest has just released its latest generation of proprietary backend software that incorporates an all-new customer-facing portal. This new release will enable DOSarrest to implement changes to customer configurations in seconds, enabling them to apply custom made DDoS mitigation modules extremely quickly. It is also equipped with an Intrusion Detection System (IDS), allowing the security team to pinpoint sophisticated layer 7 attacks as well as provide cloud based Web Application Firewall...

Read More



Tripwire launches NERC Alliance Network

Tripwire, Inc. has introduced the NERC Alliance Network, an expansion of its Technology Alliance Partner (TAP) program and NERC Solution Suite.

Read More

McAfee outlines strategy for connected network security

McAfee, part of Intel Security, has outlined its strategy for helping businesses and government agencies strengthen their network protection through a powerful combination of integrated technologies. As part of its strategy, McAfee is strengthening its network portfolio with deeper integration and expanded use of both global and local threat intelligence.

Read More

Latest Informatica Secure@Source release solves complex enterprise data security challenges for...
Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...
Nearly 70% of SMBs have not identified and documented cybersecurity threats.
Acquisition enables Imperva customers to increase user access to sensitive data assets while...
Reported DDoS global attacks grow by 23 percent quarter-over-quarter, up by 75 percent from the...
Network security provider expands EMEA Distribution Channels.
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more