How Next Gen IT Security Can Combat IPv6-Based DDoS Attack Challenge
By Glen Ogden, Regional Sales Director, Middle East at A10 Networks IPv6. We’ve heard it’s been coming for years but no, it’s not here yet. However it’s “here” enough to be a security threat to every...
View ArticleArbor Networks’ ATLAS Data Shows, Average DDoS Attack Size Increasing
Arbor Networks Inc. , a provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, has released Q2, 2015 global DDoS attack data that show strong growth in...
View ArticleDell set to acquire EMC for $ 67 billion
Bringing together two of the biggest IT led innovators in the ICT domain, Dell Inc. and EMC Corporation have signed a definitive agreement under which Dell, together with its owners, Michael S. Dell,...
View ArticleBrocade Joins Intel Security Innovation Alliance, to Secure New IP Solutions
Brocade has joined the Intel Security Innovation Alliance program. As part of this program, Brocade intends to integrate Intel Security products and technologies with Brocade solutions, enabling...
View ArticleF-Secure partners with Panache to secure Air PC computer-on-a-stick experience
F-Secure is partnering with Panache, a brand of Vardhaman Technology to safeguard its Air PC computer-on-a-stick experience and enable its users to stay protected from online threats. The Panache brand...
View ArticleHow Advanced Cyber Attacks Can Hide in SSL Traffic and Create Havoc within...
By: Glen Ogden, Regional Sales Director, Middle East at A10 Networks From Target to Sony, and Anthem to Ashley Madison, no company is immune to the risk of cyber-attacks and the resulting loss of...
View ArticleSophos Brings Synchronized Security to Endpoints and Networks
Sophos has introduced the first synchronized security protection against today’s sophisticated threats with the Sophos Security Heartbeat™ capability of the Sophos XG series of next-generation...
View ArticleA10 Networks Extends Multi-Vector DDoS Protection
A10 Networks is collaborating with Verisign to enable hybrid DDoS mitigation strategies for customers. A10 Networks has also unveiled enhancements to its multi-vector DDoS protection solution, Thunder...
View ArticleHealthcare IT at Risk from Security-Agnostic #GenMobile Side-Effects
Healthcare organizations are ill prepared for the high-risk mind-set of the #GenMobile workforce (new generation of employees who are molding their work lives around their mobile devices), with a lack...
View ArticleWhy ‘Security of Everything’ will be at the Helm for Year 2016
By Abdul Rehman, Regional Manager, Pulse Secure There is no disputing the fact that 2015 wasn’t a great year for IT security. We saw a number of high profile breaches and this was happening in many...
View ArticleCheck Point, IBM Security Form Threat Prevention Alliance
Check Point Software Technologies and IBM Security have announced an expanded alliance, including the sharing of threat intelligence, as the security industry moves to a more collaborative approach to...
View ArticleWhy Security is Important for Mobile-first, Cloud-first World
By CommunicAsia2016 Summit speaker, Pierre Noel, Chief Security Officer and Advisor, Microsoft Asia, shares his thoughts on threats in the cyber world By 2020, four billion people will be online, 50...
View ArticleIntel Security Report Shows Majority of IT Budgets Will Focus on Cloud
Intel Security has released Blue Skies Ahead – The State of Cloud Adoption, a global report advocating the need for technology vendors to help businesses, governments and consumers understand the...
View ArticleCIBIL selects IBM Security to strengthen, protect critical systems
IBM has announced that Credit Information Bureau India Limited (CIBIL), India’s pioneer Credit Information Company (CIC), has selected IBM Security to strengthen security and protect their critical...
View ArticleHow Adaptive Trust Can be a Defense for Securing Enterprise Mobility
By Michael Netterberg, Solution Architect, Networking at Aruba, a Hewlett Packard Enterprise company BYOD, cloud and the Internet of Things are changing enterprise defense plans to guard against points...
View ArticleHow Enterprise is getting Public Cloud Security Wrong
By: Gordon Haff, Cloud Strategist at Red Hat If, just a few years ago, you were to ask a CIO about their advice for securing a public cloud, the odds aren’t bad that their response would have been...
View ArticleCisco Closing ‘Security Effectiveness Gap’ with Integrated Cloud-Based Solutions
Cisco has announced new services and cloud-based security solutions built with Cisco’s threat-centric security architecture. With best of breed security solutions uniquely architected to be integrated,...
View Article3 Ways to Make the Most of Data Centre Firewall to Ensure Enterprise Security
By Kasey Cross, Security Evangelist and Sr. Product Marketing Manager at A10 Networks Firewalls are an integral part of multi-layered defenses for businesses. Today’s Next-Gen firewalls secure the...
View ArticleBYOD Means ‘Bring Your Own Disaster’ if Enterprise Don’t Plan for Security
By Ammar Enaya, Regional Director, HPE Aruba, Middle East & Turkey As adoption of wearables becomes more mainstream in the Middle East, it brings added complexity to BYOD in an enterprise. One of...
View ArticleIntel Security Appoints Anand Ramamoorthy as MD for India & SAARC
Intel Security has appointed Anand Ramamoorthy as Managing Director, India and SAARC. His key responsibilities include driving enterprise centric product revenues, strengthening the customer base...
View Article
More Pages to Explore .....