News & Views

CyberArk Announces Strong Second Quarter 2015 Results
31.08.2015
CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced financial results for the second quarter ended June 30, 2015."CyberArk had a strong second quarter and delivered results that again exceeded our guidance across all financial metrics," said Udi Mokady, CyberArk CEO... »


 

HOB Honored as a Winner in the 10th Annual 2015 IT World Awards
31.08.2015
HOB, a market leader in secure remote access solutions, has been honored with three awards for its Remote Desktop Virtual Private Network (HOB RD VPN ) in the 10th Annual 2015 IT World Awards, hosted by Network Products Guide, the IT industry-s leading technology research and advisory publication. The 10thh Annual 2015 IT World Awards honor excellence in every facet of the industry, including the products and people behind the successes... »


 

BalaBit announces general availability of Blindspotter; advanced monitoring to identify suspicious user activity
31.08.2015
BalaBit, an IT security innovator specialising in advanced user monitoring technologies, today announced that its next-generation IT security tool, Blindspotter, is now generally available. Blindspotter is a real-time, user behaviour analytics (UBA) tool that analyses user activities and identifies suspicious events occurring throughout IT systems... »


 

The twins: two brothers on probation were arrested for online-banking theft in Russia
31.08.2015
Information Security Center of the Russian FSB, DESAC (Department of Economic Security and Anti-Corruption), Investigative Department of the Russian Ministry of Internal Affairs, with the assistance of expert organization Group-IB and security department of Sberbank carried out an operation to arrest members of an organized group of cyber criminals.This group was using malicious software to gain access to customers accounts and under the guise of bank employees was extorting SMS authorization codes required to steal the money... »


 

Qrator Labs and Circuit Exchange announce the start of technological partnership
31.08.2015
Qrator Labs and Circuit Exchange announce the start of technological partnership | comnews Today one of the most reliable DDoS mitigation schemes is the algorithm directing all traffic to pass through a specialized network where it undergoes analysis and filtering, sending it over VPN directly to customer-s network afterwards. Under the terms of cooperation Qrator Labs and Circuit Exchange have already implemented several unique joint projects... »


 

Fluke Networks LinkSprinter Continues to Impress Industry Experts, Garner More Honors
31.08.2015
The LinkSprinter network tester from Fluke Networks has recently been named a finalist for two industry awards. In addition to being named Best in Show runner-up in the Testing category at Interop Tokyo, LinkSprinter has won the Voice, Data, and Video (V/D/V) Test and Measurement Equipment category for Electrical Construction and Maintenance (EC&M) Magazines 2015 Product of the Year Awards... »


 

The LEC-7230M: A Robust, Nimble and All-purpose Embedded Hardware Solution
31.08.2015
Lanner today announced the release of the LEC-7230M, an aluminum and SGCC variant of the recently released LEC-7230L.The LEC-7230M and the LEC-7230L are both powerful and nimble all-in-one, one-for-all embedded box PCs powered by the Intel Celeron Bay Trail, a SoC known for its significant improvement in computing performance and power efficiency... »


 

Fortinet has Shipped More Than Two-Million Appliances Since Inception to Global Customers Looking for the Very Best in Cyber Threat Protection
31.08.2015
Fortinet - the global leader in high-performance cybersecurity solutions, today highlighted results from International Data Corporation-s (IDC) latest Worldwide Quarterly Security Appliance Tracker report, revealing that Fortinet has shipped more than two-million security appliances since the company-s founding in 2000. In addition, IDC reports that Fortinet has shipped more security appliances each year than any other vendor since 2013, and has the largest market share of combined appliance shipments since 2012... »


 

FPT Software Improves Software Quality and Security with Synopsys- Coverity Solution
31.08.2015
Synopsys, Inc. today announced that FPT Software, a large global technology, outsourcing and IT services company headquartered in Vietnam, has adopted Coverity Enterprise Code Advisor, Synopsys- industry-leading static code analysis solution, to help ensure their client deliverables meet the highest quality and security standards.FPT Software provides full lifecycle services including software design, development, migration and modernization, following best-in-class processes certified for ISO-9001... »


 

CyberArk Achieves Common Criteria Certification; Validates CyberArk Solutions to Secure Privileged Access to Federal Systems
31.08.2015
CyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it has achieved Common Criteria Evaluation Assurance Level EAL 2+ for its comprehensive CyberArk Privileged Account Security Solution. The certification underscores CyberArks commitment to helping federal organizations and global enterprises secure privileged accounts the "keys to the IT kingdom" before cyber attackers can steal and exploit them to gain access to sensitive data and systems... »


 

Imperva appoints Gerri Elliott to its board of directors
31.08.2015
Imperva Inc, committed to protecting business-critical data and applications in the cloud and on-premises, today announced that Geraldine "Gerri" Elliott has joined its Board of Directors. Elliotts management experience includes executive leadership positions in some of the world-s largest high tech companies, and serving on the boards of directors of top retail brands in the U... »


 

Huawei redefines innovative ICT to enable smart energy at its Global Energy Industry Summit 2015
31.08.2015
With energy as a driving force for global economic development, energy companies around the world are encountering a multitude of challenges as they move towards digital transformation. Against this backdrop, Huawei hosted its Global Energy Industry Summit 2015 with the theme of "Innovative ICT Enables Smart Energy" in Almaty, Kazakhstan, from August 19 to 20, 2015... »


 

Falcongaze is a brand new partner of Bitrate
31.08.2015
Falcongaze announces the start of cooperation with Bitrate, which is one of the leading suppliers of solutions for security, analysis and network monitoring in South Africa. The partnership agreement between the two companies was signed to expand geographical presence of Falcongaze in the international market... »


 

IT Guard, distributor of information security products in Russia and CIS countries, has signed a partnership agreement with SOC Prime
31.08.2015
IT Guard, distributor of information security products in Russia and CIS countries, has signed a partnership agreement with SOC Prime, which offers innovative solutions for tuning, optimization and development of SIEM systems as well as integration of separate security components into a single integrated structure.SIEM solutions are often used by businesses for such purposes as automation of the fraud detection and remediation, creation of Security Operations Center (SOC), and regulatory compliance... »


 

AirWatch Surges Ahead with Largest EMM Market Share Worldwide inShare Worldwide
28.08.2015
Enterprise Mobility Management Software Market Shares report identifies AirWatch as largest EMM provider in terms of 2014 revenue and market share Atlanta July 1, 2015 AirWatch by VMware, the leading enterprise mobility management (EMM) provider, announced today leading analyst firm IDC confirmed AirWatch is the largest EMM vendor in terms of 2014 revenues and holds the overall greatest market share. The annual Worldwide Enterprise Mobility Management Software Market Shares, 2014, analyzed the top 15 vendors in terms of GAAP revenues... »


 

Huawei and Red Hat successfully complete agile integration tests for multiple vendors to accelerate NFV development
28.08.2015
 Huawei and Red Hat recently announced that they have completed the first phase of agilely integrating multiple vendors- MBB architectures by adopting Network Functions Virtualization (NFV) technologies. As part of this partnership, Huawei and Red Hat have successfully conducted high performance LTE tests in heavy-traffic scenarios in NFV/Software-defined networking (SDN) Open Labs in Xi-an, China, to facilitate and accelerate NFV industry development... »


 

Fortinet Launches the Industry-s Most Secure Cloud-Managed Enterprise Wi-Fi Solution
28.08.2015
Fortinet, the global leader in high-performance cybersecurity solutions, today announced enhancements to its cloud-based FortiCloud management system and a new line of cloud-managed wireless access points (APs), continuing the company-s strategic investments and momentum in the secure wireless networking market. Fortinet-s "FortiAP-S series" wireless LAN (WLAN) APs are the most secure cloud-managed enterprise Wi-Fi products on the market, featuring Fortinet-s cybersecurity technology running directly on the AP and the latest security updates from Fortinet-s industry-leading FortiGuard Labs Threat Intelligence team... »


 

DDoS-Guard Has Introduced Real-time Protection Against DDoS Attacks
28.08.2015
DDoS-Guard has introduced a series of secured solutions and servers which guarantee automatic real-time protection to our customers against any type of Distributed Denial of Service (DDoS) attacks.The number of ddos attacks on WEB resources is growing daily, especially in politically unstable countries... »


 

AirWatch Commits to New Georgia Tech Internet of Things Research Center, CDAIT
28.08.2015
AirWatch, the leading enterprise mobility management provider, today announced it is a founding charter sponsor of the recently established Center for the Development and Application of Internet-of-Things Technologies (CDAIT) at Georgia Tech. Through the sponsorship, AirWatch establishes its commitment to developing the incredible opportunity the Internet of Things (IoT) technologies can bring to market... »


 

Synopsys, UL to Reveal Details About Cybersecurity Assurance Program at CodenomiCON USA 2015
28.08.2015
Synopsys, Inc. today announced that UL will present details about its Cybersecurity Assurance Program (CAP) at CodenomiCON USA, hosted by Synopsys at the House of Blues in Las Vegas, Nevada, on August 4. This presentation follows ULs April announcement of a collaboration between UL and Codenomicon, a cybersecurity company hrecently acquired by Synopsys... »


 

InfoSecurity Russia-2015: Keynote Theatre of Global leaders calls for experts
03.07.2015
23th of September within The Keynote Theatre, which is traditionally held at the Main Arena of Infosecurity Russia Ian Evans, Airwatch EMEA Vice President and Managing Director (on photo) will perform with his keynote presentation... »


 

InfoSecurity Russia 2015 calls for speakers!
29.05.2015
InfoSecurity Russia is the only IT Security exhibition in Russia and major business event which plays an integral role in networking between suppliers and decision makers and keeping security professionals connected.2014 showed excellent results and proved InfoSecurity Russia as must-to-attend IT Security Event... »


 

Radwares Attack Mitigation System Selected by BlackMesh - Provides Customers Protection Against DDoS Without Impacting Legitimate Traffic
21.04.2015
Leading cloud hosting company to offer DDoS protection as a service Radware (NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, announced BlackMesh, a Virginia based cloud hosting company that specializes in Drupal (CMS) hosting and managed server hosting has selected Radwares Attack Mitigation System which includes DefensePro as the core product, to provide distributed denial of service (DDoS) protection as a service to its clients. As a provider of information technology solutions for businesses of all industries and sizes, BlackMesh services more than 500 customers in North America through its three highly-secure datacenters located in Virginia, Nevada, and Ontario... »


 

Imperva Names Sunil Nagdev as Senior Vice President of Worldwide Services and Support
18.04.2015
Professional track record highlights success buildingworld-class, partner friendly services and support teams  Imperva Inc. (NYSE... »


 

Thales launches BYOK Deployment Service for Microsoft Azure Cloud Applications
16.04.2015
Unique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud Thales, leader in information systems and communications security and pioneer with Microsoft in bring your own key (BYOK) technology, announces the launch of its BYOK Deployment Service Package. The new service offering makes the process of creating and securely transferring keys to Microsoft Azure cloud easy and allows organizations to take advantage of cloud services with greater confidence... »


 

CyberArk Software Ltd. Files Registration Statement for Proposed Secondary Offering
15.04.2015
CyberArk Software Ltd. (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it has filed a registration statement on Form F-1 with the Securities and Exchange Commission for a proposed secondary public offering of its ordinary shares. The underwriters will have a 30-day option from the date of the offering to purchase additional ordinary shares... »


 

Check Point Acquires Hyperwise to Deliver Industrys First CPU Level Threat Prevention Capabilities
15.04.2015
Acquisition of Stealth-Mode Start-up Enhances Threat Prevention Portfolio to Stop Attacks Before They HappenCheck Point Software Technologies Ltd. (NASDAQ... »


 

Akamai Acquires Octoshape
15.04.2015
Octoshape to provide Akamai unique video optimization technology designed to enable superior IP broadcast experiences Akamai Technologies, Inc. (NASDAQ... »


 

IBM and Juniper Networks Partner to Build Smarter Networks with Predictive Analytics
15.04.2015
EmailPDFPrintRSS"Integrating predictive analytics directly into the stream of data processing and embedding it into the network of CSPs will help to ensure the reliability of the network and improve customer engagement" IBM (NYSE... »


 

UL LLC Collaborates with Codenomicon to Test Industrial Automation Equipment and Services and Medical Devices for Digital Security Vulnerabilities
15.04.2015
UL and Codenomicon have collaborated to develop and perform security testing on network connected devices. Initial testing will be on industrial automation equipment and services and medical devices, with planned expansion into security testing in other industries... »


 

Palo Alto Networks Launches Global Fuel User Group to Shape the Future of Cybersecurity
15.04.2015
Members benefit from expert engagement, community, peer-driven events, and educational resourcesPalo Alto Networks (NYSE... »


 

Ixia Study Finds That Hidden Dangers Remain within Enterprise Network Virtualization Implementations
12.04.2015
When it comes to virtualization, lack of visibility and monitoring increases vulnerability  Ixia (Nasdaq... »


 

New Net Technologies (NNT) IT Guard,
11.09.2014
New Net Technologies (NNT) IT Guard . (PCI DSS)... »


 

Microsoft and Akamai Join Forces in First Cyber-Security Focused Accelerator in Israel
31.07.2014
Microsoft and Akamai Technologies, a leading provider of cloud services for delivering, optimizing and securing online content and business applications, have announced that, together with leading VC Jerusalem Venture Partners (JVP), they are working together on the unique accelerator in the field of cyber-security. The program is located at the Microsoft Ventures Accelerator in Israel, and interested entrepreneurs and startups can apply now at http... »


 

Akamai Releases Prolexic Q2 2014 Global DDoS Attack Report
31.07.2014
Akamai Technologies, Inc., the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced availability of the Prolexic Q2 2014 Global DDoS Attack Report. Prolexic Technologies, now part of Akamai, is a recognized leader in Distributed Denial of Service (DDoS) protection services, and has produced the quarterly Global DDoS Attack Report since 2011... »


 

Cloud Providers: Beware DDoS Domino Effect
25.07.2014
In this day and age, almost every organization is using the Internet as a platform for business as they realize the benefit of outsourcing online operations such as websites, storage, e-commerce, email, and domain name system (DNS). It makes sense because it allows them to focus more on the core business... »


 

VMware and AirWatch integration continues: Now all channel partners can sell AirWatch.
25.07.2014
Since VMware acquired AirWatch back in February, we-ve known that there-s a long integration road ahead. While AirWatch will continue to operate as a subsidiary, VMware has ambitious (yet logical and exciting) plans to integrate AirWatch-s enterprise mobility products into their end user computing offerings... »


 

3M receives a Big Tick two years running
25.07.2014
3M has won its second annual award in a row for sustainability from the organisation Business in the Community (BITC).The Big Tick award has been presented in the Marketplace Sustainability Leadership category and heralds the companys ongoing achievements right across its UK sites... »


 

Visit InfoSecurity Russia-2014 - learn new philosophy for Cyber Security from world expert Chris Gould
21.07.2014
Chris Gould, Partner of PwC will perform with keynote speech at InfoSecurity Russia-2014When foreign governments, organized crime, or hackers target an organization, the techniques they use to compromise the network and enable sensitive data theft are well planned and methodical. Advanced cyber threat groups are extremely patient, tending to invest heavily in the research and development of custom malicious code and clever means to exfiltrate data; all designed to slip past the cyber security radar... »


 

Ask Eugene Kaspersky - Visit InfoSecurity Russia-2014 and learn the answer
17.07.2014
Ask a question to world-s leading expert in the field of Information Security!Send the question: http... »


 

Artificial intelligence - Friend or Foe to Information Security?
09.07.2014
Coined by computing pioneer Alan Turing in 1950, the Turing test was designed to be a rudimentary way of determining whether or not a computer counts as "intelligent".This year, for the first time in history, a machine bot, called Eugene Goostman succeeded in that goal... »


 

Are you Information Security trend setter? Join Worlwide trends exposition at InfoSecurity Russia 2014
25.06.2014
InfoSecurity Russia2014 opens new special demo zone for foreign companies who wants to be presented to Russian market and find new partners.The WORLDWIDE TRENDS demo-zone - is a modern booth in the central part of the exposition where companies will present their products among the worlds Information Security hotest trends... »


 

3M Appoints Nicholas C. Gangestad to Senior Vice President and Chief Financial Officer
11.06.2014
3M today announced that Nicholas C. Gangestad has been appointed senior vice president and chief financial officer, effective immediately. Nick replaces David W... »


 

AirWatch by VMware Recognized as a Leader in the 2014 Gartner Magic Quadrant for Enterprise Mobility Management for the Fourth Consecutive Year
11.06.2014
AirWatch by VMware, the leading enterprise mobility management (EMM) provider, announced today that industry analyst firm Gartner, Inc. positioned AirWatch as a Leader in the 2014 Magic Quadrant for Enterprise Mobility Management for the fourth consecutive year... »


 

CyberArk CEO Udi Mokady Selected as an Ernst and Young Entrepreneur of the Year 2014 Award Finalist in New England
11.06.2014
CyberArk CEO Udi Mokady Selected as an Ernst and Young Entrepreneur of the Year 2014 Award Finalist in New EnglandCyberArk, the company securing the heart of the enterprise, today announced that Founder, President and CEO, Udi Mokady, has been selected as a finalist for the Ernst and Youngs EY Entrepreneur of the Year 2014 Award in the New England Region.  A panel of independent judges presides over the award nominations, recognizing entrepreneurs who demonstrate excellence and extraordinary success in such areas as innovation, financial performance and personal commitment to their businesses and communities... »


 

Synology Unveils DiskStation DS414slim
11.06.2014
Compact and Eco-friendly NAS ServerSynology today introduced DiskStation DS414slim, a 4-bay NAS server designed specifically for home and small office users to leverage the compactness of 2.5" hard drives... »


 

Scotch Brand Partners With Brit + Co. to Find Americas Most Amazing Makers
10.06.2014
As the maker movement has become more mainstream, all kinds of makers have emerged. From artists and moms to teachers and teens, people are exploring their creativity and tackling do-it-yourself projects every day oftentimes using a Scotch Brand product to help get the job done. Scotch Brand from 3M is partnering with Brit Morin maker, CEO and founder of Brit + Co... »


 

Infosecurity Russia 2014: In cloud we trust
05.06.2014
During the 2013 the cloud services market in Russia has reached a volume of 10.97 billion rubles, which is 50% higher than in 2012. in the structure of Russian IT services market cloud services indicate the maximum growth rate, though still occupy a relatively small share... »


 

Codenomicon at international cyberdefense exercise Locked Shields 2014
03.06.2014
Codenomicon took part in the real-time network defense exercise Locked Shields 2014 this week. Organized by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) the exercise brought together close to 300 participants from 17 countries. Locked Shields has been organized annually since 2012... »


 

Heartbleed Bug: What Risks Remain?
03.06.2014
In the more than a month since news of the OpenSSL vulnerability known as the Heartbleed bug first surfaced, many organizations have made progress in remediating the risks. Yet the vulnerability still exists on many systems... »


 
: 1 2 3 4 5 >

[Valid RSS]

| Share

CyberArk Announces Strong Second Quarter 2015 ResultsCyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced financial results for the second quarter ended June 30, 2015.

More

HOB Honored as a Winner in the 10th Annual 2015 IT World AwardsHOB, a market leader in secure remote access solutions, has been honored with three awards for its Remote Desktop Virtual Private Network (HOB RD VPN ) in the 10th Annual 2015 IT World Awards, hosted by Network Products Guide, the IT industry-s leading technology research and advisory publication. The 10thh Annual 2015 IT World Awards honor excellence in every facet of the industry, including the products and people behind the successes.

More

BalaBit announces general availability of Blindspotter; advanced monitoring to identify suspicious user activityBalaBit, an IT security innovator specialising in advanced user monitoring technologies, today announced that its next-generation IT security tool, Blindspotter, is now generally available. Blindspotter is a real-time, user behaviour analytics (UBA) tool that analyses user activities and identifies suspicious events occurring throughout IT systems. It is designed to help organisations mitigate the impact of advanced persistent threats (APTs) or identify malicious internal activity and to speed up the investigation process of any suspicious activity.

More

The twins: two brothers on probation were arrested for online-banking theft in RussiaInformation Security Center of the Russian FSB, DESAC (Department of Economic Security and Anti-Corruption), Investigative Department of the Russian Ministry of Internal Affairs, with the assistance of expert organization Group-IB and security department of Sberbank carried out an operation to arrest members of an organized group of cyber criminals.

More

Qrator Labs and Circuit Exchange announce the start of technological partnershipQrator Labs and Circuit Exchange announce the start of technological partnership | comnews Today one of the most reliable DDoS mitigation schemes is the algorithm directing all traffic to pass through a specialized network where it undergoes analysis and filtering, sending it over VPN directly to customer-s network afterwards. Under the terms of cooperation Qrator Labs and Circuit Exchange have already implemented several unique joint projects: so as to prevent hacker attacks, the traffic of the protected websites goes into the Qrator cloud and uses secure channels to reach customer-s web infrastructure.

More

Fluke Networks LinkSprinter Continues to Impress Industry Experts, Garner More HonorsThe LinkSprinter network tester from Fluke Networks has recently been named a finalist for two industry awards. In addition to being named Best in Show runner-up in the Testing category at Interop Tokyo, LinkSprinter has won the Voice, Data, and Video (V/D/V) Test and Measurement Equipment category for Electrical Construction and Maintenance (EC&M) Magazine’s 2015 Product of the Year Awards. As a category winner, the LinkSprinter is now eligible for the overall Product of the Year award, which EC&M will announce in August.

More

The LEC-7230M: A Robust, Nimble and All-purpose Embedded Hardware SolutionLanner today announced the release of the LEC-7230M, an aluminum and SGCC variant of the recently released LEC-7230L.

More

Fortinet has Shipped More Than Two-Million Appliances Since Inception to Global Customers Looking for the Very Best in Cyber Threat ProtectionFortinet - the global leader in high-performance cybersecurity solutions, today highlighted results from International Data Corporation-s (IDC) latest Worldwide Quarterly Security Appliance Tracker report, revealing that Fortinet has shipped more than two-million security appliances since the company-s founding in 2000. In addition, IDC reports that Fortinet has shipped more security appliances each year than any other vendor since 2013, and has the largest market share of combined appliance shipments since 2012. This important data reinforces Fortinet-s strategy to provide customers across the globe with the most robust platform of integrated, high-performance cybersecurity solutions, from the datacenter to the cloud and everything in between.

More

FPT Software Improves Software Quality and Security with Synopsys- Coverity SolutionSynopsys, Inc. today announced that FPT Software, a large global technology, outsourcing and IT services company headquartered in Vietnam, has adopted Coverity Enterprise Code Advisor, Synopsys- industry-leading static code analysis solution, to help ensure their client deliverables meet the highest quality and security standards.

More

CyberArk Achieves Common Criteria Certification; Validates CyberArk Solutions to Secure Privileged Access to Federal SystemsCyberArk, the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it has achieved Common Criteria Evaluation Assurance Level EAL 2+ for its comprehensive CyberArk Privileged Account Security Solution. The certification underscores CyberArk’s commitment to helping federal organizations and global enterprises secure privileged accounts – the "keys to the IT kingdom" – before cyber attackers can steal and exploit them to gain access to sensitive data and systems.

More