WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > VisualThreat
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
Data Security
XM Cyber | May 06, 2021
XM Cyber, the multi-award-winning leader in cyberattack path management, today announced that it has signed an agreement with Italy-based value-added distributor (VAD) ICOS. This agreement will enable ICOS to offer XM Cyber solutions in the Italian market to help organizations protect their most critical assets. "XM brings a new approach that uses the attacker perspective to find and remediate critical attack paths toward organizations' crown jewels across on-premises and...
Enterprise Security, Platform Security, Software Security
Businesswire | June 15, 2023
Absolute Software™ (NASDAQ: ABST) (TSX: ABST), the only provider of self-healing, intelligent security solutions, today announced the expansion of its differentiated Security Service Edge (SSE) solution with the launch of the Absolute Secure Web Gateway Service. Optimized for hybrid and mobile work models, this new extended offering builds on existing capabilities available in Absolute Secure Access – including Absolute ZTNA and Absolute Insights™ for Network &...
Data Security, Platform Security, Software Security
BeyondTrust | September 19, 2022
BeyondTrust, the leader in intelligent identity and access security, announced today a new strategic partnership with NCS Group, a leading technology services firm that provides services and solutions in consulting, digital, technology, cybersecurity and more. A strong player in identity security, NCS will be using the technology provided by BeyondTrust to offer companies best practice solutions in Privileged Access Management (PAM), a core component of enabling Zero Trust security. Read More
PlainID | September 05, 2022
PlainID, the Authorization Company™, announces today the release of "Build vs Buy: Guide to Evaluating Authorization" in collaboration with Simon Moffatt, founder and analyst of The Cyber Hut. The increase in remote work and digital commerce has created a proliferation of digital identities which demand secure, frictionless access to applications and the underlying data. The guide is designed to address and inform on key criteria when considering whe...
Software Security
Article
Whitepaper
Network Threat Detection, Platform Security, Software Security
Enterprise Security, Network Threat Detection, Software Security
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE