VMware 'transforms' Hybrid Cloud security for mobile users

VMware says that it is transforming hybrid cloud security for mobile end users through the combination of VMware NSX(TM) network virtualization and the company's business mobility solutions, AirWatch® by VMware and VMware Horizon®.

Read More

AlienVault introduces Unified Security Management 5.0

USM 5.0 narrows the gap between security awareness and action with new asset management and threat intelligence capabilities.

Read More

Corero announces integration with Verisign OpenHybrid

Corero Network Security has announced its integration with Verisign OpenHybrid and support for Verisign’s open standards-based approach for hybrid DDoS solutions. For Verisign and Corero customers, this integration combines on-premises technology from Corero Network Security to defeat sub-saturating DDoS attacks alongside cloud-based DDoS Protection Service from Verisign for high volume and complex application layer attacks that exceed the customer’s network and resource capacity....

Read More



Widening gap between perimeter security perception and reality

While 87% of IT decision-makers feel their organisation’s perimeter security is effective at keeping out security threats, 30% of IT decision-makers admit their company has fallen victim to a data breach.

Read More

The results for the British Crime Survey for the first time show that fraud and cyber...
Dell Software has announced technology innovations that address a host of pressing IT challenges....
Global consultancy K3 Hosting has boosted its Managed Services offering by becoming a Webroot...
Patented solution provides visibility, control and automation across Amazon and other third-party...
Building security expert community to deliver AI-based protection.
Blue Coat Systems has entered into a definitive agreement to be acquired by funds advised by Bain...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more