Security news and support resources, featuring the hottest solutions, technologies and vendors in the Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Security

Security

Cisco: Security as a Strategic Imperative

Cisco
In the digital era, every company is considered a technology company. Whether you provide electricity, banking or public transportation, you are increasingly dependent upon the internet and network connectively. If all companies are technology companies, that means all companies need to prioritize cybersecurity as a strategic imperative to ensure they are connected, digitized and successful. […]

Citrix: Measure HDX Session Quality with NetScaler SD-WAN

Citrix Systems
What ultimately determines the success of a digital workspace initiative? Unquestionably, user acceptance. Virtualizing apps and desktops offers compelling benefits in security, management and compliance, but success ultimately depends on users embracing the technology because it makes work easier. Being able to work anytime, from anywhere, and on any device is hugely attractive, provided the […]

Modernizing Applications from PoC to Production with Docker Enterprise Edition

Docker
Containerizing a single legacy application with Docker Enterprise Edition (EE) can be quite simple and immediately makes the application more portable, scalable, and easier to manage and update. Taking this application to production requires additional planning and collaboration with security teams, performance testing and likely requires detailed operations and disaster recovery plans. This part of […]

Windows 10 App Control with VMware Workspace ONE

VMware
Preventing malware or non-corporate approved apps in your organization can be simplified with VMware Workspace ONE, powered by VMware AirWatch unified endpoint management through configuration of the App Control profile. AirWatch can prevent the downloading or execution of already installed or any store app on the device such as Netflix, Facebook, or Twitter. Learn more […]

How Hybrid Cloud Can Make it Rain for Service Providers

HP Enterprise
Do you remember the last time you took the wrapping off the box of a new software application, loaded it onto your machine, and eagerly waited for it to install? Probably not, or at least not without dusting some cobwebs off your memory. Much like the mainstream public has moved away from this slow process […]

Barry Coombs Video on ‘The increasing risk of cyber security’

ComputerWorld Group
Cyber Security is becoming increasingly more prominent in the news this year and something that we at ComputerWorld are seeing as one of the top trends within the It industry in 2017. Watch ComputerWorld Director, Barry Coombs present his thoughts about the increasing risk that cyber attacks is putting on your business every day. This […]

Citrix Video: Upload Protect against zero day threats and malware video

Citrix Systems
Ransomware, phishing attacks, and zero day exploits are the biggest nightmares facing IT today. You’ve seen it in the headlines, hackers targeting organizations, with all kinds of malware designed to not only steal sensitive data, but to encrypt it and hold it for ransom. But Citrix can help stop these attacks on day zero. Watch […]

Ransomware: The New Shrinkage?

Ivanti
Earlier this year, we began hearing reports of ransomware sweeping dozens of countries with individual attacks in the tens of thousands. Investigations took place and much more will be learned and disclosed; but already there’s an ominous thought emerging from this threat: Are ransomware attacks becoming a normal risk of doing business? Ransomware is now […]

Fixing KRACK with IGEL: Simple, Smart, Secure

IGEL Technology
A couple of days ago IGEL released security fixes for the KRACK Wi-Fi vulnerability for its IGEL OS and Windows products. As usual we have reacted fast and made out-of-band releases in order to protect our customers. A Smart Way Of Rolling Out Fixes However, having fixed software packages and firmware images available is only […]

Citrix: 5 Ways to Avoid Shadow IT

Citrix Systems
Shadow IT— technology used within an organization without explicit approval — is the modern Trojan horse. It can allow ransomware and malware to invade your network, cause data leaks and even introduce compliance risks. Here are five easy ways to avoid shadow IT: 1. Understand the risks Part of what makes the threat of shadow […]

Understanding Hybrid IT Strategies from Fortune 1000 IT Experts

HP Enterprise
Digital transformation is affecting businesses of all sizes and across all industries. Many, including media, entertainment, and retail, have already made the transformation, while others, such as healthcare, government, and manufacturing, are on the cusp of major changes. In a world where IT is embedded everywhere and data is becoming more readily available, businesses must embrace […]

Citrix: Five ways to identify GDPR risks

Citrix Systems
As a kid, I loved playing hide and seek. You’d close your eyes and count to 50 while everyone scattered and hid. After a scurry of tagging the hiders running to home base, we would yell “Olly olly oxen free!” to get the really good hiders to reveal themselves, so we could start the next […]

Citrix: Improve User Experience via Streamlined Centralized Secure Desktop & Performance Management

Citrix Systems
Leveraging its industry leading alliances and a strong partner eco-system, Citrix Ready ensures a great user experience for the customers and help them get additional value from their Citrix investments. Citrix Ready showcases select trusted solutions designed to meet a variety of business needs. Citrix Ready not only demonstrates current mutual product compatibility but through […]

Cisco: Data Center Application Layer Attacks

Cisco
There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs.  Data center outages can occur from a number of factors such as such as component quality issues, power supply disturbances, or human […]

Visit Our Sponsors