You Are Browsing ‘Security ’ Category

Comments Off on Dataguise recognized in MarketsandMarkets data-centric security report
(Source: App Developer Magazine) Security and risk management professionals looking to address data security and compliance issues are advised to use data-centric audit and protection products like DgSecure to mitigate threats and satisfy the regulatory requirements of protecting sensitive data. “Traditional IT security solutions have focused on protecting ......
Comments Off on VASCO Data Security International, Inc. (VDSI) Director T Kendall Hunt Sells 36,917 Shares
(Source: The Ledger Gazette) VASCO Data Security International logo VASCO Data Security International, Inc. (NASDAQ:VDSI) Director T Kendall Hunt sold 36,917 shares of the stock in a transaction on Friday, January 12th. The shares were sold at an average price of $14.37, for a total transaction of $530,497.29. Following the transaction, the director ......
Comments Off on How People HR is using the cloud to prepare for GDPR
(Source: IT PRO) "We've never been in a position where we've been providing products that didn't really need to comply with the data protection act in this country and in Europe," says Sindhar. "Similarly customer concerns about data security has always been quite high up on the agenda, if not the single most important thing on the agenda....
Comments Off on Ameritas Increases Business Agility and IT Security with Cisco Application Centric Infrastructure
(Source: WebWire (press release)) Ameritas, a large insurance company headquartered in Lincoln, Nebraska, has selected Cisco® computing, networking and security technology as the foundation for upgrading its data centers. The goal of the infrastructure upgrade was to improve agility and operational efficiency while increasing IT security. Supporting ......
Comments Off on BYOD, BYOA exposing corporate networks to complex cybersecurity issues: Fortinet
(Source: Tech Observer) “To ensure data security in the age of the mobile workforce, CISOs have to take a layered approach to security that provides visibility into data movement across the network,” added Rajesh Maurya “Specifically, this security protocol should incorporate application security, endpoint security, network segmentation and cloud ......
Comments Off on Island Tech Services (ITS) Offers Guidance to Businesses on Avoiding Ransomware Attacks
(Source: PR Newswire (press release)) "A ransomware attack typically goes undetected until it has caused significant damage in the form of business downtime and data loss," says Peter Xenakis, Regional Sales Manager and an IT security expert at Island Tech Services (ITS) (www.itsg.us.com), a leading provider of advanced technology, mobility and vehicle ......
Comments Off on Global Cognitive Security Market In IT & Telecommunication Market 2017-2023 – Market is Expected to Reach $3.68 Billion
(Source: PR Newswire (press release)) Cognitive security is widely being adopted across diverse set of industries for the protection of crucial information that includes public safety and utility companies. An increase in the adoption of the cloud-based services and the Internet across the IT & telecommunication sector, the need to protect the data has irapidly ......
Comments Off on Radware Expands Cloud Security and Global Footprint
(Source: Nasdaq) MAHWAH, N.J., Jan. 23, 2018 (GLOBE NEWSWIRE) -- Radware® (NASDAQ:RDWR), a leading provider of cyber security and application delivery solutions, is rapidly expanding the capacity of all its scrubbing centers, which increases the global mitigation capacity of Radware cloud security network to more than 3.5Tbps of ......
Comments Off on Stephens Seems to Have Lost Some Faith In Check Point (NASDAQ:CHKP), Downgrades Stocks
(Source: Frisco Fastball) The firm offers a portfolio of network security, endpoint security, data security, and management solutions. It has a 22.64 P/E ratio. It provides security gateways to protect the networks and prevent the threats of enterprises, data centers, and small and large branch offices; security gateway appliances, including platforms for ......
Comments Off on PolySwarm Partners with Rivetz to Form Decentralized Cybersecurity Consortium.
(Source: TechBullion) Decentralized IT security marketplace PolySwarm (www.polyswarm.io) and decentralized mobile security solutions provider Rivetz (www.rivetz.com) today announced a partnership to form the Decentralized Cybersecurity Consortium. DC2 is a professional group for IT security companies aimed at developing best practices ......