iStorage enters Japanese market with award winning product range

Tokyo based NewGen Technology, Inc. to make unique USB flash and portable hard drives with PIN code access and hardware encryption available in Japan and Asia/Pacific.

Read More

‘Unprecedented’ growth of advanced attacks and malicious traffic

The Cisco 2014 Annual Security Report reveals that threats designed to take advantage of users’ trust in systems, applications and personal networks have reached startling levels. According to the report, a worldwide shortage of nearly a million skilled security professionals is impacting organizations’ abilities to monitor and secure networks, while overall vulnerabilities and threats reached their highest levels since 2000.

Read More

Telenor Norway improves network visibility and security with StealthWatch

Telenor’s service portfolio in Norway includes fixed and mobile telephony, broadband and data communication services for residential and business customers, as well as a broad range of wholesale services. With more than 150 years of history as a pioneer in telecom services, Telenor Norway today boasts approximately 5.5 million customer accounts.

Read More

Addressing public and private security challenges

Juniper Networks has unveiled Firefly Suite, a virtualised security portfolio that provides granular, dynamic and secure connectivity for the private and public cloud. The suite introduces Firefly Perimeter, a virtual version of the Juniper Networks® SRX Series Services Gateway, as well as Junos® Space Virtual Director, an application that automates the management and deployment of Firefly Perimeter. When combined with enhancements to Firefly Host, which provides hypervisor-based...

Read More

Palo Alto Networks ‘raises the bar’

Palo Alto Networks has announced enhancements to its enterprise security platform that increase advanced threat detection and prevention capabilities for its customers worldwide. Most significantly, this includes enhancements to the Palo Alto Networks WildFire™ service that enable quick discovery and elimination of previously unknown malware, zero-day exploits, and advanced persistent threats (APTs).

Read More

Becrypt and Motion Computing strengthen UK partnership

New technology agreement set to deliver latest, robust PC tablets for police and emergency services.

Read More

Intel self-encrypting drives (SEDs) managed by Wave fill a void for government and enterprise...
RSA, a Dell Technologies business, has unveiled a centralized platform that is designed to...
Aerohive Networks has developed a new iOS App for guest and Bring Your Own Device (BYOD) management...
WhiteHat Security, the web security company, has introduced the rollout of its new WhiteHat...
Investment in new, local infrastructure signals long-term strategy for customer expansion and...
HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host...
Latest Video

The powers of identity and privilege

By combining Okta, the leader in identity access management; SailPoint, the leader in identity governance; and CyberArk, the leader in privileged access security; organizations now have a unified solution to securely manage and govern all users.

Read more