Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday Network of sites
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
EMA names Pulse Secure leader in hybrid IT secure access platform solutions
The survey included executives from over 200 enterprises and an analysis of hundreds of vendor product briefings, case studies and demonstrations.
To upgrade or not to upgrade – that is the security question
When we think of security, we probably think ‘software’ first. But software runs on hardware, and network security and access appliances are aging.
Relative newcomer rapidly scales APAC with Brocade tech acquisition
Launched in 2014, Pulse Secure has now acquired Brocade’s vADC product family in a bid to boost its rapid growth in both A/NZ and Malaysia.
Here's how to put the net admin out of his (her) misery
Pity the poor network admin, already struggling with all the new tech hitting the corporate infrastructure.
Mobile security company signs inTechnology as distie
Juniper Networks' off-shoot Pulse Secure signs inTechnology as local distie, aiming to address 'challenging' mobile and access security issues in ANZ.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Cutting through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.