Security

    Low-Cost Hi-Efficiency Security for IoT Assured by STMicroelectronics and Collaborators

    New long-range and low-power IoT (Internet of Things) technologies like Low-Power Wide Area Networks (LPWAN) are enabling new use cases in application areas such...

    Quantum’s New StorNext 6 Answer to Hi-Intensive Data Management

    Quantum Corp. June 6, 2017, announced StorNext 6, a major new release of its award-winning StorNext file system. StorNext 6 adds new advanced data management features to...

    Encryption Solutions that Withstands Quantum Computing Powers by Infineon

    Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies AG, the leading provider...

    Cyber Security 2020 by Rah InfoTech focusing on Cyber Security issues

    In a recently held event hosted by RAH Infotech, IT industry experts came together to discuss the 20 threats each CEO should prepare for...

    Get More Efficient VM Protection by Quantum’s New Integration With Veeam

    Quantum Corp. on May 22, announced new, unique integration with Veeam for DXi deduplication appliances and Quantum’s latest Scalar tape storage platform. These integrated...

    Your Eyes Will Unlock Tighter Security for Your Phone

    Your eyes are your passwords! A number of smartphones launched in the last 12-18 months, including the latest Samsung Galaxy S8, have in-built iris...

    How Cybercriminals Are Building an Army of Things, Creating a Tipping Point for Cybersecurity :...

    Fortinet the global leader in high-performance cybersecurity solutions, today announced the findings of its latest Global Threat Landscape Report covering Q4 2016. The research...

    Next-Gen EDRM Solutions for contemporary business challenges

    There is a growing need for ensuring data protection across applications, devices, and users. As information sharing becomes increasingly prevalent, the state of data...

    In order to stay ahead of Real- World Threats change approach towards Vulnerability management

    Skybox Security, a global leader in cyber security operations, analytics and reporting, on May 3, announced the availability of threat-centric vulnerability management (TCVM) for...

    Zyxel launches premium VPN firewall to safeguard multi-site, growing businesses

    Keeping business data safe can be tough enough for just one location, but as businesses grow, the complexity of keeping data secure multiplies. On...

    Security Fabric Automation, Visibility and Control to Cloud Environments all under Fortinet

    Fortinet the global leader in high-performance cybersecurity solutions, on April 18, announced that it has extended the performance, automation, visibilty and management of the...

    Fortinet’s Security Fabric expansion with Software defined WAN Capabilities

    Fortinet , the global leader in high-performance cybersecurity solutions, today announced the latest expansion of its Security Fabric, featuring enhanced SD-WAN functionality that is...

    Microsoft Azure Virtual Network Integration to Boosts Cloud Security Visibility

    Skybox  Security, a global leader in cybersecurity operations, analytics and reporting, announced today new interoperability with Microsoft Azure Virtual Network (VNet), enabling customers to...

    Radware Analysis: 98% of Organizations Experienced Cyber Attacks in 2016

    Radware, a leading provider of cyber security and application delivery solutions, on March 30, 2017, unveiled the Global Application and Network Security Report 2016-17. Speaking...

    Secure your Home Networks with these 3 Key Strategies

    Faster and more affordable Internet connections are driving more home users in India to deploy Internet-connected devices at home. At the same time, connectivity...

    Related News