SolarWinds Adds Increased Automation and Ease of Management to Security Solutions

SolarWinds Adds Increased Automation and Ease of Management to Security Solutions

Patch Manager, Firewall Security Manager and Log & Event Manager have been improved

Panda Cloud Systems Management Enhanced to Include Mobile Devices

Panda Cloud Systems Management Enhanced to Include Mobile Devices

The new capabilities are meant to protect sensitive corporate data

45% of Organizations Believe Their Employees Would Sell Company Data

45% of Organizations Believe Their Employees Would Sell Company Data

SailPoint has published the results of its annual Market Pulse Survey

Norse IPViking 2.0 Can Detect Malware in the Development Phase

Norse IPViking 2.0 Can Detect Malware in the Development Phase

The company has just received $10 million (€7.6 million) in Series A funding

91% of Attacks Aimed at Large Organizations Involve Phishing Attacks – Infographic

91% of Attacks Aimed at Large Organizations Involve Phishing Attacks – Infographic

Proofpoint has summed up the top threats and their impact

Bromium Teams with ForeScout to Fight Advanced Malware Attacks

Bromium Teams with ForeScout to Fight Advanced Malware Attacks

Take a look at how the companies' solutions will work together

Watch a 3D Visualization of 2013’s Top Cyber Attacks

Watch a 3D Visualization of 2013’s Top Cyber Attacks

OpenDNS highlights that visualization is the key to big data security techniques

Venafi Launches Mobile Certificate Manager

Venafi Launches Mobile Certificate Manager

The solution is designed to protect enterprises against threats that exploit certificates

Understaffed: A Web Series by F-Secure

Understaffed: A Web Series by F-Secure

A 4-minute pilot episode has been published on YouTube

FireEye Launches Oculus for SMBs

FireEye Launches Oculus for SMBs

The solution offers protection for web, email and mobile systems

Kaspersky Details Corporate Threats in 2013 Security Bulletin – Video

Kaspersky Details Corporate Threats in 2013 Security Bulletin – Video

Motives, techniques, targets and cyber mercenaries

39% of IT Pros Admit Using Unauthorized SaaS Apps to Bypass IT Processes

39% of IT Pros Admit Using Unauthorized SaaS Apps to Bypass IT Processes

McAfee has released a study called “The hidden truth behind Shadow IT”

ISF Makes Security Predictions for 2014

ISF Makes Security Predictions for 2014

BYOD, privacy, the cloud, cybercrime and the Internet of Things

IT Security Firm Accumuli Buys Eqalis for $3.1M / €2.3M

IT Security Firm Accumuli Buys Eqalis for $3.1M / €2.3M

Part of the sum will be paid on completion, while the rest over a period of three years

Virtual Disaster Recovery and Enhanced Data Protection Included in IASO Online Backup

Virtual Disaster Recovery and Enhanced Data Protection Included in IASO Online Backup

The latest version also integrates with ConnectWise tools

Norse Darklist: Constantly Updated List of High-Risk IP Addresses

Norse Darklist: Constantly Updated List of High-Risk IP Addresses

Currently, around 3 million malicious IP addresses are on it

VSS Monitoring Launches Big Data Visibility Solution

VSS Monitoring Launches Big Data Visibility Solution

The solution is based on two products: vSpool and vNetConnect

 
Want more? Browse: