20/20 visibility key to improving network security
IT leaders around the world share a ubiquitous appetite for greater network visibility, according to a new study from Infoblox.
Kaspersky launches operational technology visibility solution
With new EDR functionality in Kaspersky Industrial CyberSecurity, customers can now gain instant visibility on OT security incidents and run response actions.
Key technology trends driving the retail customer experience
Today’s fragmented sales environment presents new challenges and opportunities for brands, who must now do more to meet heightened customer expectations.
Progress launches latest version of network visibility solution
In Flowmon 12 network solution, Progress has expanded its support for public cloud provider flow log monitoring and launched new features.
What CISOs think about cyber security, visibility and cloud
Seeking to uncover the minds of CISOs and CIOs across Asia Pacific, my company recently asked Frost & Sullivan to take a snapshot of cloud adoption behaviour in the region.
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Databricks announces new offering for Unity Catalog
Databricks has significantly expanded data governance capabilities on the lakehouse by unveiling data lineage for Unity Catalog.
CrowdStrike doubles down on visibility with new graph database
CrowdStrike Asset Graph is a new graph database powered by the CrowdStrike Security Cloud, providing IT leaders with a 360-degree view into all assets.
Avoid the sugar high: Making the most of the government's SMB digital sweetener
With the federal election now behind us, small-to-medium businesses (SMB) in Australia still face the same challenges and opportunities they did just a few weeks ago.
Juniper expands SASE offering with data loss prevention capabilities
Juniper has announced the expansion of its SASE offering with the addition of cloud access security broker (CASB) and data loss prevention (DLP) capabilities.
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
CloudBolt advanced capabilities aim to solve persistent problems
CloudBolt Software has announced advanced capabilities designed to overcome critical roadblocks many of the world's largest organisations are experiencing.
Are you leveraging the full potential of SD-WAN?
The evolution of SD-WAN technology means it's now much more than it was originally sold to be, but do customers really understand the expanded value proposition?
How free migration tools compare with paid solutions
The road to the cloud follows two common paths: via economic first-party migration tools from public cloud providers or third-party solutions from specialist vendors.
Check Point Software
Check Point recognised for leading threat detection solution
"The latest ATT&CK Evaluations results highlight Check Point Harmony Endpoint’s leadership for the second consecutive year."
ExtraHop brings greater security to cloud environments
ExtraHop has extended the power of Reveal(x) 360 to provide frictionless threat visibility for Amazon Web Services (AWS).
Imperva releases API security solution as threats ramp up
Imperva has launched Imperva API Security with continuous API discovery and data classification, a product that can be deployed in any environment.
Why doubling down on corporate defence works so well
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
How to make a business ‘invisible’ to hackers
Critical to every organisation is how to stop a cyber-security breach AND the damage it causes and do so within available budgets.
Axonius launches first SaaS risk management product
SaaS management tools typically cater to the business side or the security posture management side, but each side is still prone to visibility gaps and information siloes.
Is BYOD the final mile to Digital Transformation success?
The concept of bring your own device (BYOD) has been around for years, but since the shift to more remote and hybrid working around the world, its popularity has reached bold new heights.
CrowdStrike expands CrowdXDR Alliance with three new partners
"We established this community-driven approach to further extend partner value and deliver customers a holistic and simpler view of threats across the entire technology landscape."