WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > ENUSEC
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
ENTERPRISE SECURITY
MRK Technologies | April 18, 2022
MRK Technologies, a cybersecurity risk management company, has announced a collaboration with Horizon3.ai to assist its clients tackle the ever-evolving ransomware threat with a new Autonomous Penetration Tests as a Service (APTaaS). Penetration testing can be automated and executed as often as needed to guarantee all systems are safe utilizing Horizon3.ai's NodeZero platform. John Tookman, Chief Revenue Officer and Senior Vice President of MRK Technologies said that "We ...
SOFTWARE SECURITY
Sternum | June 21, 2022
Sternum, a pioneer in autonomous IoT security and observability, has joined NXP Semiconductors' software partner community, one of the world's top makers of embedded controllers and largest marketplaces. As a result, IoT manufacturers that rely on NXP for their controller supply will be able to effortlessly integrate Sternum's proprietary security and visibility capabilities into their products as a result of this agreement. With a CPU overhead of less than 3% during t...
Forcepoint | July 28, 2020
Global cybersecurity leader Forcepoint today announced the introduction of its Dynamic Edge Protection suite of cloud-native SASE solutions featuring new Cloud Security Gateway and Private Access offerings. With today's introduction, Forcepoint is delivering the industry's most comprehensive suite of converged capabilities to address enterprises' most critical work-from-home security challenges across network security, threat protection, secure access and data protection.Forcep...
Help Net Security | March 18, 2020
The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete. A 2019 study by research firm Gartner found that “more users, devices, applications, services and data are located outside of an enterprise than inside. Driven by the adoption of multi-cloud infrastructure and applications, mobility and distributed workforces, the focal point for security has shifted to users and devices...
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE