Magazine Button

Enterprise Security

McAfee MVISION Cloud achieves AWS Security Competency status

McAfee, a device-to-cloud cybersecurity company, has announced that McAfee MVISION Cloud has achieved Amazon Web Services (AWS) Security Competency status and received AWS Well-Architected designation for its Cloud Access Security Broker (CASB) technology. This makes McAfee the first CASB technology vendor to achieve AWS Security Competency status, demonstrating its technical proficiency and relentless execution to […]


Fortinet continues commitment to close the cyberskills gap

Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, has announced it continues to lead the way on training and education in the company’s ongoing efforts to close the cybersecurity skills gap by rolling out further expanded training and education initiatives. Recent additions to the company’s education and training programming includes additional Fortinet […]


Thales enables future of digital payment innovations with next-gen HSM

Thales, a leader in critical information systems, cybersecurity and data protection, has announced the availability of a next-generation payment hardware security module (HSM), payShield 10K, enabling customers to adopt new innovative digital payment technologies easily and securely. The new payment HSM secures digital payments at lower processing costs by using a fraction of the energy. […]


Cybera expert on the benefits of secure SD-Wan Edge solutions

Hubert da Costa, SVP and GM EMEA at Cybera, examines how traditional VPNs are failing to meet the challenges of distributed enterprises and why secure SD-WAN Edge solutions are gaining broad market adoption. Virtual private networks (VPNs) are a well-established method deployed by businesses around the world to keep remote locations connected and deploy new […]


BeyondTrust expert on approaching the zero trust security model

More and more organisations are looking to implement a zero trust security model. Here Morey Haber, CTO at BeyondTrust, argues that this is not something everyone can do unless they are embarking on a brand new initiative. A zero-trust security model redefines the architecture of a trusted network inside a defined corporate perimeter. This is […]


One year on, what has been the impact of GDPR on data security?

New statistics from the UK government’s Department for Digital, Culture, Media and Sport (DCMS) have shown a reduction in the percentage of businesses suffering a cyberbreach or attack in the last year. The 2019 Cyber Security Breaches Survey shows that 32% of businesses identified a cyberattack in the last 12 months – down from 43% […]


Sophos report reveals cyberattacks on Cloud Honeypots

Sophos study of 10 Cloud Server Honeypots placed worldwide reveals the need for visibility and security to protect what businesses put into hybrid and all-cloud platforms.   Sophos, a global leader in network and endpoint security, has announced the findings of its report, Exposed: Cyberattacks on Cloud Honeypots, which reveals that cybercriminals attacked one of […]


Why network breaches are making CIOs/CISOs positions more challenging

CIOs and CISOs across industries are regularly moving between positions and companies because of network breaches. Gamal Emara, Country Manager – UAE at Aruba, a Hewlett Packard Enterprise company, tells us how to avoid this. It’s your worst possible nightmare. A hacker has breached the company’s network and shut down its operations. Millions in revenue is […]


Redstor says World Backup Day was a reminder to liberate your backup

Redstor, a global data management SaaS specialist, says there was a good reason why World Backup Day was on March 31 – to emphasise that, if you don’t get it right on that date, you risk being made to look a fool when the time comes to recover data on April 1. “Monitoring and managing […]


Keysight releases findings of The State of Cloud Monitoring study

Keysight, a leading test and measurement vendor, has released the results of a survey sponsored by Ixia, on The State of Cloud Monitoring. The report highlights the security and monitoring challenges faced by enterprise IT staff responsible for managing public and private cloud deployments. The survey, conducted by Dimensional Research and polling 338 IT professionals […]


Browse our latest issue

Intelligent Data Centres

View Magazine Archive