WELCOME TO The Information security REPORT
Reflexion Networks, Inc.
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Futurex | October 12, 2021
Futurex’s key management technology and Google Cloud EKM give customers more control over encryption keys to maximize data security, privacy, and compliance
BULVERDE, Texas, October 12, 2021 — Futurex, a leader in hardened, enterprise-class data security solutions, today announced support for Google Cloud External Key Manager (EKM), giving customers more control over encryption keys. Google Cloud EKM gives users full...
Trend Micro Incorporated | September 07, 2021
Trend Micro Incorporated a global cybersecurity leader, today announced the launch of Trend Micro Service One, consolidating its managed services to optimize enterprise threat management. The new services bundles, which can include premium support, an early warning service, Managed XDR and incident response, help customers prevent, detect and respond to cyber threats faster by supplementing internal resources.
The prevalence of cybersecurity threats and the dynamic threat landscap...
ActZero | May 02, 2022
ActZero, a cybersecurity startup whose AI-powered managed detection and response (MDR) technology enables enterprises to cover more area, today announced a strategic partnership with TD Synnex, a global IT distributor and solutions aggregator. The agreement strengthens ActZero and TechData's current cooperation, which started in September 2021.
The ActZero platform integrates next-generation antivirus protection, endpoint detection and response (EDR), and automated and control...
NETSCOUT | November 08, 2021
NETSCOUT SYSTEMS, INC.a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced the availability of Omnis® Cyber Intelligence (OCI), the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies thre...
DATA SECURITY,SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE