You Are Browsing ‘Security ’ Category

Comments Off on Mimecast (MIME) Earning Somewhat Positive Media Coverage, Study Finds
(Source: StockNewsTimes) The Company's suite of cloud services protects customers from the business and data security risks. It also mitigates the business disruption that e-mail failure or downtime causes. In addition, its archiving services secure, store and manage critical corporate communications and information to address the compliance and ......
Comments Off on Criteo (CRTO) Upgraded to “Hold” at Zacks Investment Research
(Source: registrarjournal.com) Criteo SA logo Zacks Investment Research upgraded shares of Criteo (NASDAQ:CRTO) from a strong sell rating to a hold rating in a report released on Wednesday. According to Zacks, “Criteo SA is a global technology company that specializes in performance display advertising. The Company offers clients a range of ......
Comments Off on Palo Alto Networks unveils cloud security offering
(Source: Networks Asia) Continuous data security and compliance for all three major clouds: New protections will be provided by Aperture security service to enable discovery and monitoring of cloud resources, guard against sensitive data loss, enable monitoring for risky or suspicious administrator behavior, and provide additional protection ......
Comments Off on Konica Minolta Strengthens IT Security Services through Acquisition of Assets of VioPoint, Inc.
(Source: GlobeNewswire (press release)) Ramsey, NJ, Feb. 22, 2018 (GLOBE NEWSWIRE) -- Konica Minolta Business Solutions U.S.A., Inc. (Konica Minolta), a leader in information management, today announced the asset acquisition of VioPoint, Inc, an Auburn Hills, MI based company specializing in intelligent cyber security. VioPoint's team of cybersecurity ......
Comments Off on VASCO Data Security International (VDSI) Issues Earnings Results
(Source: The Ledger Gazette) VASCO Data Security International logo VASCO Data Security International (NASDAQ:VDSI) released its earnings results on Wednesday. The technology company reported $0.14 earnings per share for the quarter, beating the Zacks' consensus estimate of $0.10 by $0.04, Briefing.com reports. The firm had revenue of ......
Comments Off on United States: Data Security Threats Evolve
(Source: Mondaq News Alerts) Credit cards were a big concern in the era of data security 1.0. Breaches like TJX, Home Depot and Target made national headlines. Fortunately, the adoption of smart cards with chips and improvements in advanced fraud detection rendered those types of breaches less profitable, and therefore less prevalent. So, cyber ......
Comments Off on Cisco Meraki Introduces MV12 Cloud-Managed Security Cameras
(Source: Security Sales & Integration) When Cisco consummated a $1.2 billon all-cash deal for Meraki in 2012, it brought in house a specialist in Cloud-based, managed networking solutions for connectivity, data security, mobile device management and communications. The division continues to sell its own switches, cybersecurity appliances, wireless access ......
Comments Off on New Verizon Communications Inc. (NYSE:VZ) study reveals organizations across numerous industries compromised mobile data security
(Source: Benchmark Monitor) A new report from Verizon Communications Inc. (NYSE:VZ) found that organizations across numerous industries compromised mobile data security because of speed to market priorities and a lack of threat awareness according to survey respondents. As business usage of mobile devices, the Internet of Things and other ......
Comments Off on Android Security Bulletin February 2018: What you need to know
(Source: TechRepublic) With only four vulnerabilities marked Critical, the Android security bulletin has started to lose significant weight. That doesn't mean it should be ignored, as there are still a number of issues marked High. But given the Critical issues continue to shrink, a conclusion could be drawn that the later iterations of the platform are ......
Comments Off on Data security + IT asset disposition: Avoiding a costly breach
(Source: CIO) Data security is always among the highest priorities for any company. However, what happens to technology assets at the end of its life is rarely at the top of the list. Often customers' specifications for large-scale refresh projects contain literally hundreds of pages of requirements around new equipment and then, at the very ......