WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Sword Group
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
PLATFORM SECURITY,SOFTWARE SECURITY
Omega Systems | January 10, 2023
On January 09, 2023, Omega Systems, a Pfingsten Partners portfolio company, announced the acquisition of The TNS Group, a leading IT services provider based in Stamford, CT. The acquisition strengthens and further expands Omega's footprint in the Northeast and key target industries, such as healthcare, fintech and non-profit. The TNS Group has been delivering the offices in Stamford, Fairhaven, MA, New York City, and with technology, IT consulting, and cybersecurity services...
DATA SECURITY
Symmetry Systems | June 24, 2021
A well-known provider of cutting-edge Data Store and Object Security (DSOS), Symmetry Systems, has announced a $15 million Series A funding round. ForgePoint Capital and Prefix Capital lead it. They are two premier venture funds, who are investing in transformative and foundational technologies. The investment will back the rapid growth of the company in customers, revenue, and employees. This newest funding round also highlighted participation from Symmetry Systems and Accenture ...
Biometric Update | March 10, 2020
Verizon Business is launching biometrics-backed Verizon Identity among three new security solutions added to its product portfolio to help companies fight cybercrime. The new cybersecurity offerings include Verizon Managed Detection and Response and Verizon Machine State Integrity, and the company has upgraded its Rapid Response Retainer service that provides cyber intelligence and incident response performance from the Verizon Threat Research Advisory Center (VTRAC), the company announced. Veri...
HITRUST | December 18, 2021
HITRUST today announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware. The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive – designed to maintain...
SOFTWARE SECURITY
Article
infographic
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE