Juniper adds intrusion deception on the firewall

Juniper Networks has announced Juniper Argon Secure, an advanced anti-malware service for Juniper Networks® SRX Series Services Gateways to identify malware that traditional solutions cannot detect. Building on Juniper’s success using Intrusion Deception to prevent attacks against web...

Read More
Blue Coat to deliver ‘transformative’ security solution with HP

Lifecycle defence delivers operational control by aligning perimeter protection with actionable security intelligence and analytics.

Read More
Thales announces support for F5 Synthesis Architecture

F5 BIG-IP support for Thales hardware security modules offers customers highest levels of security and reduces risk.

Read More
Dell Software expands Dell One Identity

Integration of Dell’s identity governance and privileged management solutions provides a...

Read More
Check Point introduces Software-defined Protection security architecture

‘Revolutionary’ security blueprint powered by collaborative intelligence.

Read More
Lancope announces Global Secure Partner Program

Program enables reseller partners to capitalise on rapidly growing market demand for...

Read More
Databarracks disrupts the channel with launch of Databarracks Partner (de)Programme

Databarracks has announced the launch of its new reseller network, the Databarracks Partner...

Read More
Organisations see Public Cloud sharing tools as primary security risk

Survey of more than 600 IT professionals highlights dangers of public cloud services such as...

Read More
Trend Micro evolves mobile security solutions

Company’s CEO unveils comprehensive mobile security offerings at Mobile World Congress.

Read More
NTT Com Security and Palo Alto Networks sign global Managed Security Services agreement

NTT Com Security and Palo Alto Networks have entered into a global managed security services...

Read More
Trend Micro SafeSync keeps data safe end-to-end for Calligo’s offshore cloud customers

Trend Micro is pleased to announce a new partnership with Jersey-based cloud provider Calligo,...

Read More
Beware of suspect devices

Two recent incidents show that attacks involving the Internet of Things are becoming a reality....

Read More
ISACA issues first audit programs aligned with COBIT 5

Global IT association ISACA has issued five new audit programs—the first of more than 30...

Read More
AlienVault continues rapid expansion of Open Threat Exchange

AlienVault™ has announced continued momentum behind its Open Threat Exchange™ (OTX)...

Read More

Videos

Dr. J Metz, SNIA Chair, explains how AI workloads are extraordinarily complex and constrained by issues related to latency, space, power and cooling, memory, and cost and how addressing these problems through...
Adam Salley, Sr. Director, Solutions Specialists, Kaseya, provides a comprehensive, insightful overview of the many topics and technologies impacting the Business Continuity Disaster Recovery (BCDR) landscape...
Ian Schenkel, Chief Revenue Officer, Cyber Intelligence House (CIH), explains how the company’s intelligence-driven Cyber Exposure Platform is designed for MSSPs to deliver high margin, high value services...
David Primor, Ph.D., Co-founder and CEO of Cynomi, discusses the launch of ELEVATE, a new partner program purpose-built to drive growth, scalability, and success in the delivery of cybersecurity, compliance,...

Expert Opinions

By Ben Coleman, Wholesale Account Director UK at 11:11 Systems.
By Bob Wambach, VP, Portfolio & Strategy, Dynatrace.
By Micah Heaton, Executive Director, Microsoft Security Centre of Excellence at BlueVoyant.
By Anna Pavlova, Senior Vice President for Strategy, Market Development, and Sustainability, CarbonQuest.