WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > SAM Labs
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Platform Security
Splashtop, Acronis | July 06, 2022
Managed Service Providers (MSPs) using Acronis for endpoint protection management can now initiate Splashtop remote control sessions directly from within the console to provide faster, reliable support for client workloads. CUPERTINO, Calif. and MIAMI, FL, July 6, 2022 — Splashtop and Read More
prnewswire | October 13, 2020
Cyberpion, an ecosystem security pioneer, today announced it has emerged from stealth after closing an $8.25 million seed funding round co-led by Team8 Capital and Hyperwise Ventures. The company's groundbreaking platform enables security teams to identify and neutralize the rising threats stemming from vulnerabilities within online assets throughout an enterprise's far-reaching, connected ecosystem. Cyberpion will use the new capital to boost its sales and marketing efforts, while expan...
Enterprise Security
Globenewswire | July 17, 2023
Xage Security, the leader in zero trust cybersecurity solutions for the real world, today announced that it has been recognized as a Representative Vendor in the 2023 Gartner Market Guide for Cyber-Physical Systems Protection Platforms. This is the inaugural Gartner Market Guide to focus on Cyber-Physical Systems (CPS) Protection Platforms, which are emerging as a leading cybersecurity market segment for protecting operations and mission-critical environments. Gartner defines th...
Data Security,Platform Security,Software Security
Beyond Identity | December 09, 2022
Beyond Identity, the leading provider of phishing-resistant multi-factor authentication (MFA), has expanded its integration offerings to include cloud security leader Zscaler. The joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling secure access to applications. As threat actors’ attacks increase in scope, using freely available tools that simplify the task, legacy MFA solutions that ...
Enterprise Identity
Article
InfoSec Project Management
Whitepaper
MARKETING DATA
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE