CA Technologies to acquire Xceedium

CA Technologies has signed a definitive agreement to acquire privately held Xceedium, Inc., a provider of privileged identity management solutions that protect on-premise, cloud and hybrid IT environments. Terms of the agreement were not disclosed. The transaction is expected to close within the quarter.

Read More


Blue Coat launches Endpoint Alliance Ecosystem

Blue Coat Systems has unveiled its Alliance Ecosystem of Endpoint Detection and Response (EDR) partners. Blue Coat developed this ecosystem to allow actionable intelligence gathered from endpoint security solutions to be shared with the entire Blue Coat security portfolio, enhancing customers’ ability to protect, detect and respond to incidents. Founding members of the Blue Coat Endpoint Alliance Ecosystem are Bit9 + Carbon Black, Countertack, Digital Guardian, Guidance Software,...

Read More

Disjointed technologies as biggest challenge facing UK IT security pros

Lack of qualified staff named second biggest challenge with user access and vulnerability management among the top headaches for overworked security teams.

Read More

Hacks proliferate, while financial institutions bank on data protection to limit exposure in the cloud

CipherCloud has released its Q2 2015 Global Cloud Data Security Report. This quarter's report focuses on the strategies of over 50 global companies in banking, investment, wealth management and other areas of financial services used to protect sensitive data in the cloud. The takeaways provide real world tested guidance for other enterprises as they assess their options for protecting information against a potential data breach.

Read More

Imation Lock & Key solution provides new levels of data security  

Lock & Key is a component of Imation’s recently announced Secure Data Movement Architecture (SDMA™), integrating administrative security with Imation’s Nexsan Assureon secure archive storage solutions.

Read More

Overwork and burnout are very real issues for the IT security industry in 2020, according to the...
Prioritising Privileged Access Management helps protect businesses from insider risks and external...
IT decision makers are facing major challenges between dynamic adversaries, significant legislation...
Businesses urged to protect themselves against cyber crime after new statistics show over four in...
In 2016, less than 5 per cent of organisations used smartphones to enable access to offices and...
Report indicates that consumers are likely to avoid conducting business with an organization that...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more