WELCOME TO The Information security REPORT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
globenewswire | August 05, 2020
Check Point Software Technologies Ltd, a leading provider of cyber security solutions globally, extends its cyber security academia cooperation with New York University (NYU) to nurture the next generation of computer engineers. For the first time, NYU is partnering with a cyber-security software company that addresses multi vector protections: cloud, network, endpoint, and mobile. Leveraging Check Point’s unmatched experience and expertise in the cyber landscape, NYU Tandon School of Engi...
DATA SECURITY, ENTERPRISE IDENTITY
Cybeats | September 29, 2022
Cybeats Technologies Inc., a leading software supply chain risk and security technology provider announces a strategic partnership with Veracode, a leading global provider of application security testing solutions.
The partnership will leverage complementary expertise to ensure customers receive the highest standard of cybersecurity solutions. Cybeats' software supply chain security product, SBOM Studio, will be available to customers through Veracode Partners, and the compani...
Thrive | May 20, 2022
Thrive, one of the leading Managed Security Services Providers (MSSPs) in the world, has made a significant investment to upgrade their 24x7x365 eyes-on-glass Security Operation Center (SOC) by integrating a Security Orchestration, Automation, and Response (SOAR) engine. The SOAR capabilities will enable the Thrive global security team to better navigate today's complex, risk-laden environment for clients via tool aggregation and coordinated response, unified operations, reduced alert fatigu...
ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Tenable | March 13, 2023
Tenable®, the Exposure Management company, announced unveiling new features within Tenable OT Security, delivering greater protection for operational technology (OT), industrial control systems and critical infrastructure, regardless of deployment size or environment configuration.
The new feature keeps the CISO's organization front and center, making it easier to protect and maintain governance of the whole attack surface using the same tools and processes th...
DATA SECURITY, ENTERPRISE IDENTITY, ENTERPRISE SECURITY
DATA SECURITY, ENTERPRISE IDENTITY, SOFTWARE SECURITY
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the
community for FREE