Tufin highlights three key challenges for data centre migration in 2015

Tufin®, the market-leading provider of Security Policy Orchestration solutions, is spearheading a drive to help companies understand and overcome the network and security challenges involved in migrating data centres. The company has outlined three key challenges to effective data centre migration faced by businesses - including application connectivity management, security and compliance - and how these can be overcome with the help of Tufin’s Orchestration Suite.

Read More




Sophos announces the future of comprehensive, simple-to-manage enduser protection

Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering unprecedented protection against malware and advanced threats, Next-Generation Enduser Protection includes the integration of Sophos’ innovative endpoint, mobile and encryption technologies.

Read More

Cohesive Networks introduces micro-perimeter security

Cohesive Networks has announced the availability of VNS3:turret. As the latest software offering in the VNS3 product family, VNS3:turret is a set encrypted, clustered software-only virtual instances that create a micro-perimeter around mission critical business systems.

Read More

New Compliance Resource Centre whitepaper enables organisations to prepare for the transition from...
Aqua Security is expanding into cloud security posture management (CSPM) with its acquisition of...
Staff burnout and a shortage of IT skills could weaken Britain’s defence against attacks on...
451 Research is pleased to announce the hiring of two new members to its growing analyst team:...
By Phil Holmes, UK Channel Director, SafeNet.
Reliability, performance and powerful scripting tools help leading non-profit organization deliver...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more