News & Highlights Archive
News & Highlights
(Source: Dark Reading) If you’re an IT security professional looking for a new job, you’re not alone. A new report on IT securityjob trends finds that 60% of survey respondents are …
Read More
News & Highlights
(Source: Wall Street Journal) The question of when to outsource security functions is key in the retail sector, … The mobile app is based on a distributed development model internationally.
Read More
News & Highlights
(Source: Markets Insider) “With the combination of RedLock and our existing cloud security offerings, we … most difficult challenges of securing a mobile workforce, protecting the public …
Read More
News & Highlights
(Source: CRN) IBM this week pulled back a patch for a significant security vulnerability in its WebSphere Application Server software when the fix caused problems with some …
Read More
News & Highlights
(Source: Telecompaper) It is called Usher and replaces traditional forms of security with mobile identity badges. An Usher badge can serve as an access method for every enterprise …
Read More
News & Highlights
(Source: Finextra) Gemalto, a company with a broad range of solutions from secure software to biometrics and encryption, has customers in over 180 countries and provides …
Read More
News & Highlights
(Source: Fairfield Current) It offers BlackBerry Enterprise Mobility Suite, which combines and integrates mobile security, management, productivity, and collaboration solutions, such as …
Read More
News & Highlights
(Source: Industry News Updates (press release) (blog)) Market study report Titled Global IT Security Spending Market 2018 Industry Research Report recently published on marketsnresearch.com is the key document …
Read More
News & Highlights
(Source: IT PRO) Every SME needs to invest in network, endpoint and mobile security. We’ve reviewed all-in-one solutions from Kaspersky, Panda, Sophos and Zyxel; they’re all …
Read More
News & Highlights
(Source: PressOracle) The Company’s solutions include Network Access Control; Endpoint Compliance; Bring Your Own Device & Mobile Security for Enterprise; Vulnerability …
Read More