Please turn on your JavaScript for this page to function normally.
One-time password authentication for MS DirectAccess

Gemalto announced that its Strong Authentication Server and Protiva OTP Tokens have been integrated with Microsoft DirectAccess. The Protiva OTP token adds another layer of …

Information security pros stretched thin and overworked

A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies being widely adopted by businesses are …

Managed file transfer with large enterprise clustering

Axway introduced large enterprise clustering for its SecureTransport offering. SecureTransport simplifies and secures file transfers between people, sites, applications and …

Distributed security architecture for security enforcement

The new borderless organizations have dramatically changed the definition of how, when and where people work, causing a need to redefine the way security solutions are built …

Comprehensive vulnerability, configuration, OS and app auditing

nCircle announced that its solutions now audit for over 40,000 conditions including vulnerabilities, configurations, operating systems and applications. The company also …

Real-time threat intelligence delivery

As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …

Mobile security solution enforces policy in the cloud

Zscaler unveiled Zscaler Mobile, which adds a uniform way to secure the mobile experience for small to large organizations. The solution enforces policy in the cloud, not on …

Securing data centers from blended threats

Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said …

Cloud encryption software for private cloud infrastructures

CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company …

One in 10 IT pros have access to accounts from previous jobs

According to a survey that examines how IT professionals and employees view the use of policies and technologies to manage and protect users’ electronic identities, the …

Closing the privileged identity visibility gap

Security information and event management (SIEM) solutions have become a must-have in IT environments because the technology helps make sense of the vast quantities of data …

Cloud-based software reputation platform

Bit9 announces the first open, cloud-based reputation platform available to assess the trustworthiness of software. The Bit9 Global Software Registry (GSR) is now accessible …

Don't miss

Cybersecurity news