5 Reasons to Secure your Citrix Environment with Gemalto SafeNet Authentication

"The five reasons presented will be:
• Fast deployment – With out of the box integrations, showing the different integration methods.
• Low day-to-day operational overhead – via automated lifecycle admin, self service, alerts, multi-tier architecture, etc.
• Convenience/assurance levels - Broad range of methods offer convenience and varying levels of assurance.
• Extensibility – broad ecosystem support lets you fully, centrally manage strong authentication from a single point of management, with no need for additional components and servers, etc.
• Cost – optional cloud efficiencies, software-based tokens, flexible subscription-based pricing, migration options, etc"
Watch Now


CRYPTOJACKING. Using someone else's compute and resources to mine cryptocurrencies.. DATA LEAK. The exposure of confidential data through misconfigurations or similar modes. SSH BRUTE FORCE ATTACK. Repeated attempts to guess secure shell username & password combinations in an attempt to gain


Have you been affected by the cyber attack?


PowerON recently shared a blog ‘WannaCry NHSCyberAttack and what can be done to prevent or mitigate’ where Steve Beaumont discusses how the attack could have been avoided (hindsight is a wonderful thing) and the Microsoft solutions available to help eliminate future risks. For those interested to learn more, watch Steve Beaumont, PowerON’s Product Development Director, deliver a webinar demonstratiing how you can protect your organisation from future attacks as well as resuming services following an attack. The webinar also explores the free tools and services available as well as quick fixes for the immediate and long term.

Panel: BYOD - Why can't we just say yes?

"As the post-PC revolution gains momentum, and dependence on tablets grows, IT departments are receiving repeated requests from employees to bring their own device to work. BYOD is said to increase productivity, due to familiarity of the software, and the initial cost of investment is removed – so, why isn’t the answer a simple yes? Finding answers to this and other questions, and being aware of the risks associated with modern digital needs will be popular themes at Cyber Security EXPO 2014. Join us in this exclusive panel debate, in which Paul Fisher, Conference Producer, Cyber Security EXPO, will be joined by Quentyn Taylor, Director of Information Security, Governance and Risk at Canon to give real time insight from a leading global organisation. Also joining the panel , Alistair Mutch, Regional Director UK&I at MobileIron. Alistair has a vast experience of mobile security and networking and a great ability to connect technical implications to strategic business decisions."

(ISC)² SecureMinneapolis2015

(ISC)2 offers a comprehensive range of quality, high-level educational events. Professionals can earn CPEs at (ISC)2 e-Symposiums and (ISC)2 Security Leadership Events. (ISC)2 Secure Events take place throughout the year and in cities across the globe. Upcoming Secure Events focus on managing risk in the ever-changing threat landscape, advancing the cybersecurity workforce, and other pressing topics of interest to the Information Security community.

Web Security Wish List for Effective Network Protection

"You deserve to have everything you want for Web Security. Here is what’s likely on your wish list. •Effective protection against advanced cyber attacks •Safe application enablement •Unwanted and high-risk websites blocked •Simple deployment of one appliance to cover everything •No call for emergency responses Learn how a next-generation web security solution can deliver what legacy, proxy-based alternatives don’t. Watch this webinar as your first step to making your network more secure and your life easier."