Please turn on your JavaScript for this page to function normally.
BYOD is not for every company, or every employee

The rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace, according …

Data protection for the cloud with ProtectV

As more data moves to private or public clouds, the number of super-users with access to an organization’s data multiplies, the risk of VMs being copied without the …

65% of companies expose personally identifiable information

More than 65 percent of businesses don’t protect their customers’ private data from unauthorized employees and consultants, according to a survey of hundreds of IT …

End-to-end desktop virtualization for government organizations

Dell launched its Desktop Virtualization Solutions for Government (DVS-Gov), a secure solution that helps government agencies manage “geographic sprawl” through …

From identity and access solutions to access governance

The need to identify users, control what they can access and audit their activities is fundamental to information security. Over the past decade, there has been a tsunami of …

Provisioning is not access governance

Organizations of all sizes face ever-stricter regulatory and security requirements to protect their data, and that of their customers. But user provisioning systems alone …

Organizations lack protocols to protect data in the cloud

While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to …

Sophos helps businesses embrace BYOD

Sophos announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 2.5. With an updated web-based administrative console and new feature …

Tenable Network Security updates vulnerability management solution

Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …

10 steps to ensure users only access what they need

Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given – …

Streamline security, compliance and risk management

Through the introduction of DbProtect Active Analytics, AppSecInc narrows the communications gap between DBAs, IT security professionals and their business operations …

Free data masking download

Solix Technologies announced its EDMS Data Masking Standard Edition, a high performance data masking solution for PCI/PII compliance. Through a free download users are able …

Don't miss

Cybersecurity news