VMware 'transforms' Hybrid Cloud security for mobile users

VMware says that it is transforming hybrid cloud security for mobile end users through the combination of VMware NSX(TM) network virtualization and the company's business mobility solutions, AirWatch® by VMware and VMware Horizon®.

Read More

AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat intelligence capabilities.

Read More

Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity....

Read More



Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

According to research from Cisco, critical company data is at risk in the UK as a result of...
Capita IT Enterprise Services has achieved Physical Security Authorised Technology Provider (ATP)...
FireEye, Inc. has announced the release of a report titled, “World War C: Understanding...
AlienVault says that technology industry veteran Mike Bennett will join the company’s...
New offerings are designed to disrupt markets, capture opportunities and accelerate business.
Secureworks has released the findings of its State of Cybercrime Report 2018 to illuminate the...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more