WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Trustifi
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
prnewswire | September 28, 2020
Ivanti, Inc. , which automates IT and Security Operations to discover, manage, secure and service from cloud to edge, and is backed by affiliates of Clearlake Capital Group, L.P. (together with its affiliates, "Clearlake") and TA Associates, today announced it has signed definitive agreements to acquire MobileIron Inc. ("MobileIron"), a leading provider of mobile-centric unified endpoint management solutions, and Pulse Secure LLC ("Pulse Secure"), a leading provider...
Red Hat, IBM, Google, Microsoft | August 10, 2020
With the growth of open source software such as Linux and cloud computing becoming more wide spread, a host of tech giants have joined a new group focusing on improving security. Red Hat – the global leader in Linux open source software and solutions – is part of the Open Source Security Foundation as well as IBM, Red Hat’s owner. Also signing on are GitHub, Google, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation, ElevenPaths, GitLab, Hacker...
Platform Security
CrowdStrike | April 08, 2022
CrowdStrike , a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, and Mandiant , announced a strategic partnership that will help joint customers investigate, remediate and defend against increasingly sophisticated cybersecurity events that plague organizations globally. As part of the collaboration, Mandiant will utilize the CrowdStrike Falcon® platform and subscription offerings for its incident response (IR) services and proactive consulting engagement...
Data Security
BitTrap | October 05, 2021
Startup company BitTrap has announced a blockchain-based cybersecurity solution that leverages attackers' motivations to provide singular detection capabilities. This approach differs from cybersecurity paradigms that focus on trying to keep attackers from breaking in. Instead, it assumes some have already made their way inside a network, undetected, and is designed to identify them and reduce hacker dwell time in the compromised system. The system works by deploying a vast ne...
Software Security, API Security, Cloud Security
Video
MARKETING DATA
Whitepaper
InfoSec Project Management
Data Security, Enterprise Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE