RSA ujnveils Via family of smart identity solutions

RSA Via is among the first Smart Identity solutions that is designed to dynamically protect identities from the endpoint to the cloud.

Read More
RSA Security Analytics extends visibility from the endpoint to the Cloud

New pricing and packaging options including throughput-based pricing, subscription services and the ability for customers to leverage existing storage investments.

Read More
HP launches Cloud access security platform

HP’s commitment to data-centric security was demonstrated by its recent acquisition of Voltage Security, a leading provider of high performance tokenization and encryption. With the introduction of the new HP Cloud Access Security Protection platform, HP has now partnered with cloud access...

Read More
Organisations continue to rely on outdated access controls

Cryptzone has revealed the results of a network security survey conducted with TechValidate. The survey was conducted to determine how organizations are implementing network access control (NAC) policies and security solutions to address today’s environments, given the proliferation of...

Read More
AlienVault works with HP

AlienVault plans to work with HP to broaden the reach of cyber threat intelligence sharing to...

Read More
FortyCloud available IBM’s Cloud Marketplace

FortyCloud for IBM provides an extensive security solution to assist IBM Cloud customers meet...

Read More
Huawei appoints Vincent Pang as Western Europe President

Huawei has appointed Vincent Pang as President of Huawei's Western European Region. In his new...

Read More
Innovative ICT infrastructure is the foundation of a better connected smart nation

Huawei Rotating CEO shares vision and strategy for an ICT-empowered smart nation.

Read More
Cloud-based Privileged Identity Service

Centrify has launched Centrify Privilege Service (CPS), said to be the industry’s first...

Read More
CipherCloud launches Cloud Discovery Enterprise Edition

Dramatically enhances visibility, monitoring, and analysis of shadow IT at a global level.

Read More
Sugar joins BeyondTrust 

Former Northrop Grumman Chairman and CEO Dr. Ronald D. Sugar joins privileged account...

Read More
FireMon 'reinvents' Security Monitoring 

FireMon has released a significant advancement of its core platform through the introduction of...

Read More
Security, reliability and customer service matter most

Managed services providers (MSPs) are more focused than ever on managing endpoints and using remote...

Read More
Imperva teams with IS Group

Agreement strengthens IS Groups’ cloud service offering by providing its over 30,000...

Read More
Huntsman Security breathes new life into legacy SIEM deployments with Unified Console

Defence-grade solution brings improved visualisation, more advanced analytics and simplified data...

Read More

Videos

In this conversation, Mike Anderson, Global Channels Director at EasyDMARC, explains why DMARC has shifted from an optional best practice to a critical requirement for modern organisations. He shares how...
Unveiling the science of nickel-zinc (NiZn) batteries. In this video we break down the advantages behind our remarkable chemistry. Discover the key factors that contribute to NiZn's exceptional power, safety,...
In this interview, Dr. Brian Luckey, Chief Information Officer, and Kris Laskarzewski, Chief Transformation Officer at Integris, discuss the realities of embedding AI into a services business. From 'fail fast'...
Dr. Peter de Bock, vice president, Data Center Energy and Cooling Technology, Eaton, discusses what the launch of the NVIDIA Rubin platform means for data centre power demand, explaining that it could be a...

Expert Opinions

By Sam Manjarres, Director of Product Marketing at WatchGuard Technologies.
By Mark Lewis, Chief Marketing Officer at Pulsant.
Sam Kirkman, Director of Services, EMEA at NetSPI, on why organisations need proof, not promise, when it comes to third-party security.