WELCOME TO The Information security REPORT
Kite Distribution Limited
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Platform Security, Software Security, Web Security Tools
ThreatLocker | February 07, 2023
ThreatLocker®, an endpoint security technology pioneer, recently announced the launch of ThreatLocker Ops, a community-driven threat detection tool, at Zero Trust World. This new product helps administrators detect attempted intrusions or system vulnerabilities.
Ops is a policy-driven system that determines good or bad behavior based on ThreatLocker agent data. This information may be used to notify IT administrators of attempted attacks or to initiate measures to harden an ...
Futurex | October 12, 2021
Futurex’s key management technology and Google Cloud EKM give customers more control over encryption keys to maximize data security, privacy, and compliance
BULVERDE, Texas, October 12, 2021 — Futurex, a leader in hardened, enterprise-class data security solutions, today announced support for Google Cloud External Key Manager (EKM), giving customers more control over encryption keys. Google Cloud EKM gives users full...
Enterprise Security, Platform Security, Software Security
Businesswire | May 10, 2023
CyberArk (NASDAQ: CYBR), the global leader in Identity Security, today announced enhancements to its CyberArk Identity Flows orchestration solution, including new integrations with Gurucul, Proofpoint and SentinelOne. Part of the CyberArk Identity Security Platform, CyberArk Identity Flows automates risk response tasks and processes through no-code app integrations and workflows, and improves response times, efficiency and productivity.
CyberArk Identity Flows includes a user-fr...
Prnewswire | April 12, 2023
BigID, the leading platform for data security, compliance, privacy, and governance, today announced a breakthrough in data cleanup with the launch of its industry-first ML-powered solution for finding duplicate and similar data content. The innovative technology uses groundbreaking AI to locate both similar and duplicate data on any data set, enabling organizations to easily identify duplicate data as well as redundant, obsolete, or trivial (ROT) data. These transformative capabilities mea...
Data Security, Enterprise Security
Enterprise Security, Network Threat Detection, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE