New HP Security offerings focus on securing interactions between users, applications and data HP has unveiled a number of security solutions targeting the modern day...
The VENOM vulnerability (CVE-2015-3456) could expose VMs to unauthorized access and data theft. But is it really “bigger than Heartbleed?” Touted to be bigger than...
Says will leverage HP Fortify to further help customers manage and reduce security risk SAP will resell HP Fortify application security software as part of...
Honeywell’s Cyber Security Risk Manager Gives Industrial Users Real-Time Visibility Honeywell Process Solutions (HPS) launched the first digital dashboard designed to proactively monitor, measure and...
Unlike traditional IT-driven identity solutions, RSA Via technology is driven by business needs RSA launched the RSA Via family of Smart Identity solutions, engineered to...
Launches Satatya Samas and Cosec Arc Matrix has introduced two innovative solutions in Video Surveillance and Access Control domain respectively. In video surveillance domain it...
With PerfectStorm 100GbE, customers can now test carrier core, data center core During the 2015 RSA Conference, Ixia will demonstrate the PerfectStorm 100GbE, the industry’s...
Enterprises across transportation, communications and energy experience a five-time increase in targeted attacks in 2014 Symantec’s Internet Security Threat Report (ISTR), Volume 20 exposes a...
The solutions from Gemalto will be showcased at RSA Conference 2015 Gemalto is demonstrating at RSA Conference 2015 how its SafeNet Identity and Data Protection...
Dell Annual Threat report sheds light on emerging security risks Dell has released its annual Threat Report, which leverages research from Dell’s Global Response Intelligence...