McAfee introduces two new suites: McAfee Complete Endpoint Protection – Enterprise, and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing critical visibility to risk management. The suites are the first to include McAfee Deep Defender, a rootkit protection based on hardware-enhanced security jointly developed by Intel and McAfee, dynamic whitelisting, risk...
Read MoreHardware purchases drive increase in spending; backup/recovery software and tablets show strong growth.
Read MoreMcAfee has announced that McAfee Enterprise Mobility Management (McAfee® EMM™ software) is now fully integrated with the McAfee®ePolicy Orchestrator® (McAfee ePO™) platform. With McAfee EMM software, comprehensive security, policy, and management capabilities are extended to mobile devices. McAfee ePO software enables enterprises to protect their data on company-issued and employee-owned devices (smartphones, tablets, laptops, and desktop computers) through a single,...
Read MoreAccording to a new whitepaper revealed by independent datacentre consultancy, Glasshouse Technologies, Bring Your Own Device (BYOD) initiatives may not have met the expectations of employees, businesses or CIOs.
Read MoreCarmarthenshire County Council recently chose Trustwave SIEM (Security Information and Event Management) to reduce the cost of meeting regulations associated with the sharing of information on the Government’s secure extranet. The Welsh county council reviewed alternative solutions when its incumbent solution ran out of capacity and needed upgrading.
Read MoreBlue Coat Systems, Inc. has introduced its Business Assurance Technology blueprint. The five technology centers that deliver Business Assurance Technology make it possible for businesses and their employees, customers and partners to safely and securely choose the best technologies, applications, devices and services in the world. Blue Coat is also introducing new products that enable enterprises to deploy trusted applications and quickly remediate data breaches.
Read More