Please turn on your JavaScript for this page to function normally.
NETSCOUT launches visibility and instrumentation for threat detection in 4G and 5G networks

NETSCOUT has introduced Arbor Sightline Mobile and MobileStream to answer mobile network operators’ (MNO) need for scalable, real-time visibility, detection, and mitigation of …

Delinea Cloud Suite updates reduce the risk of lateral movement in cybersecurity breaches

Delinea announced the latest version of Cloud Suite, part of its Server PAM solution, which provides privileged access to and authorization for servers. Delinea Cloud Suite …

Hornetsecurity 365 Permission Manager helps companies protect critical data

Hornetsecurity launched 365 Permission Manager – a user-friendly, admin-centred solution to manage permissions, enforce compliance policies, and monitor violations within …

Red Hat Advanced Cluster Security Cloud Service scales cloud-native security across the hybrid cloud

Red Hat Advanced Cluster Security Cloud Service brings together Kubernetes-native security capabilities with the convenience and support of a fully Red Hat-managed offering. …

Radware Cloud Web DDoS Protection blocks Tsunami DDoS attacks

Radware has introduced a new Cloud Web DDoS Protection solution to minimize the growing gap between standard DDoS mitigation and an emerging generation of more aggressive, …

Vaultree unveils Fully Functional Data-In-Use Encryption solution for the healthcare sector

Vaultree announces a major leap forward in healthcare data protection, bringing its Fully Functional Data-In-Use Encryption solution to the sector. Coupled with a …

Veriff Age Estimation prevents users from accessing age restricted products or services

Veriff announced its new Age Estimation solution, built to further streamline the age verification process for customers. Veriff Age Estimation uses facial biometrics to …

Stytch expands its platform to offer B2B authentication

Stytch’s new offering enables B2B products and applications to build and deliver the enterprise-grade authentication requirements that their customers require, while …

Red Hat Trusted Software Supply Chain enhances an organization’s resilience to vulnerabilities

Red Hat announced Red Hat Trusted Software Supply Chain, a comprehensive solution that enhances resilience to software supply chain vulnerabilities. As part of this solution, …

Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties

Fusion Risk Management announced expanded functionality of its third-party risk management (TPRM) offering. The enhanced solution delivers continuous monitoring of third …

IRONSCALES and Infinigate collaborate to provide customers with email security solution

IRONSCALES has partnered with the Infinigate Group to distribute IRONSCALES’ cloud email security platform in the Benelux, the Nordics, and Switzerland regions, with a view to …

Conceal and White Rock Cybersecurity partner to isolate browsing sessions

Conceal has announced a new strategic partnership with White Rock Cybersecurity. “White Rock Cybersecurity is committed to delivering innovative, scalable, and …

Don't miss

Cybersecurity news