NetMotion

Absolute releases Application Persistence-as-a-Service to strengthen their mission-critical apps
Absolute Software launched Absolute Application Persistence-as-a-Service (APaaS), empowering Independent Software Vendors (ISVs) and system manufacturers to leverage …

Absolute unveils zero trust platform to monitor mission-critical security applications
Absolute Software announced it has completed the first combined product innovation milestone following its acquisition of NetMotion Software, adding the self-healing power of …

Radiant Logic appoints Justin Sollenne as CFO
Radiant Logic announced that Justin Sollenne, a seasoned financial executive, will join its growing leadership team as the Chief Financial Officer. Sollenne brings over 15 …
Absolute appoints Matt Schoenfeld as CRO
Absolute Software announced the appointment of Matt Schoenfeld as Chief Revenue Officer. Matt will join Absolute’s executive management team in mid-June 2021 and will report …
Absolute acquires NetMotion to accelerate endpoint resilience for customers
Absolute Software announced it has signed a definitive agreement to acquire NetMotion Software. Under the terms of the agreement, Absolute will acquire 100% of privately-held …

Most organizations have already migrated to a cloud VPN
The majority of organizations have already migrated their VPN solution to the cloud, a NetMotion survey reveals. A study surveyed 750 leaders working in IT, security and …

Only 12% of enterprises have fully embraced SASE
Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according …

Security teams need visibility into the threats targeting remote workers
Although only 33% of organizations are currently using a dedicated digital experience monitoring solution today, nearly half of IT leaders are now likely to invest in these …

Remote employees encounter 59 risky URLs per week
Working remotely from home has become a reality for millions of people around the world, putting pressure on IT and security teams to ensure that remote employees not only …
Deutsche Telekom and NetMotion enhance security and user experience for mobile workers
Deutsche Telekom and NetMotion have entered into a strategic partnership that will bring the software company’s enterprise-grade solutions to the carrier’s business customers …
NetMotion and Cradlepoint help mobile workforces improve productivity, user experience, and security
NetMotion and Cradlepoint announced a technology alliance relationship that will give customers in public safety, transportation, healthcare, utilities and other mobile …

Mobile security threats: Lack of visibility is putting businesses at risk
A significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks, according to a study conducted by Enterprise …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility