Read more about RSA Conference 2012
Bookmark and Share
  • Encryption and key management as strategic business issues

    02.03.2012

    Encryption is now viewed as a strategic issue with business leaders gaining greater influence over their organizationís encryption strategy, according to Richard Moulds, the vice president for product management and strategy at Thales e-Security.

  • Identity, app and mobile device monitoring

    02.03.2012

    Lancope unveiled the latest version of its StealthWatch System, which harnesses the power of NetFlow and other flow data from existing infrastructure to cost-effectively deliver end-to-end visibility for vastly improved network and security operations.

  • Trusted Computing Group unveils new membership option

    02.03.2012

    Open industry standards organization Trusted Computing Group announced it has created a new membership option, the Associate, targeted to enterprise users, service providers, and to integrators and resellers.

  • Real-time session monitoring by Cyber-Ark

    02.03.2012

    Cyber-Ark Software announced real-time session monitoring capabilities that enable immediate termination of suspicious activity.

  • Protection for data in the cloud

    02.03.2012

    Fasoo announced three security solutions that enable protection for data in the cloud.




Spotlight

Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Feb 9th
    COPYRIGHT 1998-2016 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //