Security

    Feel safe with Honeywell’s next Generation Xtralis Vesda-e Vep Aspirating Smoke Detector

    Honeywell, the world leader in advanced smoke and fire detection technologies, on June 15, announced the next generation of Xtralis VESDA  aspirating smoke detectors...

    Here are the Top Security Technologies for 2017

    Gartner, Inc. on June 14, 2017, highlighted the top technologies for information security and their implications for security organizations in 2017. Analysts presented their...

    Protect Medical Devices from Cyber-Attack in Rescue Services with Security ‘Made in Germany’

    Electronic devices in emergency medicine are extremely powerful, but often insufficiently secured against unauthorized digital access. At the Digital Summit of the German Federal...

    Low-Cost Hi-Efficiency Security for IoT Assured by STMicroelectronics and Collaborators

    New long-range and low-power IoT (Internet of Things) technologies like Low-Power Wide Area Networks (LPWAN) are enabling new use cases in application areas such...

    Quantum’s New StorNext 6 Answer to Hi-Intensive Data Management

    Quantum Corp. June 6, 2017, announced StorNext 6, a major new release of its award-winning StorNext file system. StorNext 6 adds new advanced data management features to...

    Encryption Solutions that Withstands Quantum Computing Powers by Infineon

    Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies AG, the leading provider...

    Cyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

    In a recently held event hosted by RAH Infotech, IT industry experts came together to discuss the 20 threats each CEO should prepare for...

    Get More Efficient VM Protection by Quantum’s New Integration With Veeam

    Quantum Corp. on May 22, announced new, unique integration with Veeam for DXi deduplication appliances and Quantum’s latest Scalar tape storage platform. These integrated...

    Your Eyes Will Unlock Tighter Security for Your Phone

    Your eyes are your passwords! A number of smartphones launched in the last 12-18 months, including the latest Samsung Galaxy S8, have in-built iris...

    How Cybercriminals Are Building an Army of Things, Creating a Tipping Point for Cybersecurity :...

    Fortinet the global leader in high-performance cybersecurity solutions, today announced the findings of its latest Global Threat Landscape Report covering Q4 2016. The research...

    Next-Gen EDRM Solutions for contemporary business challenges

    There is a growing need for ensuring data protection across applications, devices, and users. As information sharing becomes increasingly prevalent, the state of data...

    In order to stay ahead of Real- World Threats change approach towards Vulnerability management

    Skybox Security, a global leader in cyber security operations, analytics and reporting, on May 3, announced the availability of threat-centric vulnerability management (TCVM) for...

    Zyxel launches premium VPN firewall to safeguard multi-site, growing businesses

    Keeping business data safe can be tough enough for just one location, but as businesses grow, the complexity of keeping data secure multiplies. On...

    Security Fabric Automation, Visibility and Control to Cloud Environments all under Fortinet

    Fortinet the global leader in high-performance cybersecurity solutions, on April 18, announced that it has extended the performance, automation, visibilty and management of the...

    Fortinet’s Security Fabric expansion with Software defined WAN Capabilities

    Fortinet , the global leader in high-performance cybersecurity solutions, today announced the latest expansion of its Security Fabric, featuring enhanced SD-WAN functionality that is...

    Related News