The Critical Factors to Look for in a Cybersecurity Vendor

The Critical Factors to Look for in a Cybersecurity Vendor
Are you assessing which cybersecurity vendor to use for your business, or even consolidating to just one? There are some key characteristics and business strategies you’ll want to consider. We’ve turned to global business leaders to share their experience vetting cybersecurity vendors and even trends in the security industry that influenced their choice.
Watch Now

Spotlight

VMware, a global leader in cloud computing and virtualization technology uses MetaAccess from OPSWAT to ensure tens of thousands of remote users can access VMware's Horizon cloud software with devices that meet strict security standards. MetaAccess provides a zero trust access solution

Kristina de Nike, Director of Product Management, Horizon, discusses how OPSWAT's MetaAccess is able to detect and remediate endpoints at scale.

OTHER ON-DEMAND WEBINARS

Security Analytics: How to Identify True Risks to Your Data

Imperva

The exponential growth of users, apps, and data has led to an increase in legitimate data access, complicating the task of determining whether data access is appropriate. Traditional security approaches tend to lock things down and limit data usage by deploying broad sets of security policies. Companies that take this approach, however, are still suffering from data breaches. In the meantime, security teams are often overwhelmed with a significant amount of alerts that don’t provide actionable insights.
Watch Now

What is a Secure Software Development Framework?Enable Ginger

Application security is more than penetration testing. Organizations face a dilemma. Commercially, there is increasing pressure to shorten software release cycles, which in turn adds strain on software developers to produce faster release cycles. This in turn creates an environment where speedy release cycles take priority over
Watch Now

Key considerations for SaaS security and performance

Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create
Watch Now

Cybersecurity and Robotics Systems: Vulnerabilities and Solutions

Our Research Analyst, Satyajit Sinha will be speaking at the RoboBusiness Webinar on July 9th 2020 at 2 PM EST. The topic of the webinar is “Cybersecurity and Robotics Systems: Vulnerabilities and Solutions”. One class of edge products, rarely mentioned in the typical IoT discussions and analyses, also provide for actuation. That is, they are robotic devices. Like other ‘connected’ IoT devices, robotics systems are open to security threats, which can be one roadblock to their widespread deployments. In this session, Counterpoint Research’s Satyajit Sinha will discuss current and future cyber security threats to networked robotics systems, highlighting their vulnerabilities in the process. He will also describe various cyber security solutions and provide a competitive landscape of security solutions for robotics systems.
Watch Now

Spotlight

VMware, a global leader in cloud computing and virtualization technology uses MetaAccess from OPSWAT to ensure tens of thousands of remote users can access VMware's Horizon cloud software with devices that meet strict security standards. MetaAccess provides a zero trust access solution

Kristina de Nike, Director of Product Management, Horizon, discusses how OPSWAT's MetaAccess is able to detect and remediate endpoints at scale.

resources