Check Point introduces high-end 41000 security system

Uses multi-blade hardware architecture to deliver scalable security with high reliability.

Read More

DOSarrest releases latest generation DDoS Mitigation System Software

DOSarrest has just released its latest generation of proprietary backend software that incorporates an all-new customer-facing portal. This new release will enable DOSarrest to implement changes to customer configurations in seconds, enabling them to apply custom made DDoS mitigation modules extremely quickly. It is also equipped with an Intrusion Detection System (IDS), allowing the security team to pinpoint sophisticated layer 7 attacks as well as provide cloud based Web Application Firewall...

Read More



Tripwire launches NERC Alliance Network

Tripwire, Inc. has introduced the NERC Alliance Network, an expansion of its Technology Alliance Partner (TAP) program and NERC Solution Suite.

Read More

McAfee outlines strategy for connected network security

McAfee, part of Intel Security, has outlined its strategy for helping businesses and government agencies strengthen their network protection through a powerful combination of integrated technologies. As part of its strategy, McAfee is strengthening its network portfolio with deeper integration and expanded use of both global and local threat intelligence.

Read More

Ciber and WhiteHat Security are partnering to help enterprise customers quickly and...
NETSCOUT SYSTEMS has released its 13th Annual Arbor Worldwide Infrastructure Security...
Spirent Communications has warned of the increased likelihood of disruptions this year to a wide...
Neustar has introduced enhancements to Neustar SiteProtect, a fast, flexible, global cloud-based...
Echoworx predicts government action will force jurisdictional shopping.
Sudden changes in priorities, poor network visibility and lack of time cited as key issues for...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more