WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Network Perception | June 15, 2022
Network Perception, innovators of operational technology (OT) solutions which protect mission-critical assets, today announced that it has joined the Operational Technology Cybersecurity Coalition (OT Cyber Coalition), a diverse group of leading cybersecurity vendors dedicated to improving the cybersecurity of OT environments.
Launched in April, the OT Cyber Coalition supports an open, vendor-neutral approach to securing the nation’s critical infrastructure. Network Percepti...
Trend Micro | April 26, 2022
Trend Micro Incorporated , a global cybersecurity leader, announced the launch of Trend Micro One, a unified cybersecurity platform with a growing list of ecosystem technology partners that enables customers to better understand, communicate, and lower their cyber risk.
Organizations are battling on all fronts to face mounting cyber risks from their complex and growing attack surface with stretched teams and siloed security products. The unified security platform approach delivers...
Data Security, Enterprise Identity, Software Security
Tanium | September 16, 2022
Tanium, the industry’s only provider of converged endpoint management (XEM), today announced the first of several powerful integrations between Microsoft and the Tanium XEM platform. The integration marks the latest expansion in a relationship that includes Tanium’s membership in the Microsoft Intelligent Security Association (MISA) and its availability in the Microsoft Azure Marketplace.
By making Tanium’s rich, real-time endpoint data accessible directly from t...
Cloudflare | April 04, 2022
Cloudflare, Inc. , the security, performance, and reliability company helping to build a better Internet, today announced it has completed its acquisition of Area 1 Security.
Email is both one of the largest cloud applications for any business, and the biggest security threats that organizations of all sizes face. Yet legacy email security solutions are often expensive, overly complex, and disjointed from an organization’s holistic security strategy. Further, malicious phish...
Certifications and Training
Data Security, Enterprise Identity
Enterprise Security, Platform Security, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE