Security

Enclosed with Easy-to Use Security solutions for IoT devices by STMicroelectronics and Security Platform

Proven and standards-compliant authentication ICs from ST and embedded-security software by Security Platform to create complete drop-in solutions for IoT security Joint offering...

Feel safe with Honeywell’s next Generation Xtralis Vesda-e Vep Aspirating Smoke Detector

Honeywell, the world leader in advanced smoke and fire detection technologies, on June 15, announced the next generation of Xtralis VESDA  aspirating smoke detectors...

Here are the Top Security Technologies for 2017

Gartner, Inc. on June 14, 2017, highlighted the top technologies for information security and their implications for security organizations in 2017. Analysts presented their...

Protect Medical Devices from Cyber-Attack in Rescue Services with Security ‘Made in Germany’

Electronic devices in emergency medicine are extremely powerful, but often insufficiently secured against unauthorized digital access. At the Digital Summit of the German Federal...

Low-Cost Hi-Efficiency Security for IoT Assured by STMicroelectronics and Collaborators

New long-range and low-power IoT (Internet of Things) technologies like Low-Power Wide Area Networks (LPWAN) are enabling new use cases in application areas such...

Quantum’s New StorNext 6 Answer to Hi-Intensive Data Management

Quantum Corp. June 6, 2017, announced StorNext 6, a major new release of its award-winning StorNext file system. StorNext 6 adds new advanced data management features to...

Encryption Solutions that Withstands Quantum Computing Powers by Infineon

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies AG, the leading provider...

Cyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

In a recently held event hosted by RAH Infotech, IT industry experts came together to discuss the 20 threats each CEO should prepare for...

Get More Efficient VM Protection by Quantum’s New Integration With Veeam

Quantum Corp. on May 22, announced new, unique integration with Veeam for DXi deduplication appliances and Quantum’s latest Scalar tape storage platform. These integrated...

Your Eyes Will Unlock Tighter Security for Your Phone

Your eyes are your passwords! A number of smartphones launched in the last 12-18 months, including the latest Samsung Galaxy S8, have in-built iris...

How Cybercriminals Are Building an Army of Things, Creating a Tipping Point for Cybersecurity :...

Fortinet the global leader in high-performance cybersecurity solutions, today announced the findings of its latest Global Threat Landscape Report covering Q4 2016. The research...

Next-Gen EDRM Solutions for contemporary business challenges

There is a growing need for ensuring data protection across applications, devices, and users. As information sharing becomes increasingly prevalent, the state of data...

In order to stay ahead of Real- World Threats change approach towards Vulnerability management

Skybox Security, a global leader in cyber security operations, analytics and reporting, on May 3, announced the availability of threat-centric vulnerability management (TCVM) for...

Zyxel launches premium VPN firewall to safeguard multi-site, growing businesses

Keeping business data safe can be tough enough for just one location, but as businesses grow, the complexity of keeping data secure multiplies. On...

Security Fabric Automation, Visibility and Control to Cloud Environments all under Fortinet

Fortinet the global leader in high-performance cybersecurity solutions, on April 18, announced that it has extended the performance, automation, visibilty and management of the...

Related News