WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Vera Security
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Webinar
Data Security, Enterprise Security, Software Security
Edgio | February 28, 2023
On February 27, 2023, Edgio, Inc. announced major enhancements to its security platform to enable enterprises to better identify and respond to emerging threats while ensuring the integrity, confidentiality, and availability of their data and applications. The platform's new capabilities aim to reduce the damage caused by the upsurge in the severity of Distributed Denial of Service (DDoS) and other advanced application attacks. Edgio's DDoS scrubbing solution delivers de...
Data Security
PAGO | February 08, 2022
PAGO, a South Korean MDR provider and value-added reseller, has embraced Stellar Cyber's Open XDR Platform to expand PAGO's security-as-a-service program for organizations across the country. Stellar Cyber is the leading security operations platform for MSSPs and the creator of Open XDR. PAGO has thoroughly integrated stand-alone EDR, SIEM, UEBA, NTA, AD Security, TI Interworking, Cloud Security, and Sandbox products for its MDR service but found it nearly hard to correlat...
Radiflow | May 31, 2021
Radiflow has received extensive industry appreciation for its one-of-a-kind, fully IEC62443-compliant Cyber Industrial Automated Risk Analysis Platform (CIARA), enabling CISOs to optimize their cybersecurity expenditure non-intrusively simulating breach attempts in industrial automation networks and prioritizing the most effective mitigation measures. In accordance with Radiflow's ongoing mission of "Taking the guesswork out of OT cybersecurity," the latest edition o...
SafeGuard Cyber | July 13, 2021
The only SaaS platform dedicated to managing the entire lifecycle of digital risk protection, SafeGuard Cyber, has released conclusions from a survey of 100 IT security leaders about their safeguarding digital communications and digital risk processes. The finding of the survey indicates that cybersecurity leaders recognize what is required for adequate digital risk protection. But, they are still dealing with boundaries and susceptibilities in defending these communications, such asthird-party ...
infographic
Cloud Security
Whitepaper
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE