eHosting DataFort (eHDF) has recently launched its new Cyber Defense Centre (CDC) in Dubai Internet City.
Trend Micro offers machine learning-driven security for SMBs
Trend Micro is enhancing protection of small business endpoints by leveraging its newest capabilities of XGen security, including machine learning, inside …
Cisco unveils AMP for Endpoints
At the annual Partner Summit in San Francisco, Cisco unveiled a new approach to endpoint security, AMP for Endpoints, which combines prevention, detection and response to simplify endpoint security.
SonicWall announces spin out from Dell Software Group
Francisco Partners and Elliott Management have announced the completion of the acquisition of Dell Software Group and the spin out of SonicWall as an independent company.
Check Point flaunts threat protection technologies
Cybersecurity vendor Check Point Software Technologies is using Gitex as a platform to showcase its “complete” security architecture that defends …
Fortinet secures two NSS rating recommendations
Fortinet has earned NSS recommendations for two of their sandboxing solutions; the FortiSandbox 3000D appliance, and the FortiSandbox Cloud service.
Trend Micro helps customers fend off ransomware attacks
Recognising the growth and impact of ransomware, Trend Micro, has taken new approaches to helping customers defend against ransomware with new offerings.
Dell announces new SonicWALL ATP service
Dell has launched SonicWALL Capture Advanced Threat Protection Service, which according to the company, enhances organisations’ ability to safeguard against today’s shape-shifting cyber threats.
Evolving rules of security
Harish Chib, Vice President Middle East and Africa, Sophos, shares insights on the way channel business in network and IT security is set to develop in the era of third platform technologies.
Cyber vigilance
Radwan Moussalli, Senior Vice President – Middle East, Central Asia and Africa, Tata Communications, talks about the emerging security concerns in the digital age and how organisations can tackle these threats.
Fortinet to share insights on cyber security at GISEC 2015
Fortinet is participating at the Gulf Information Security Expo & Conference (GISEC), the Middle East’s essential IT Security Knowledge Platform, …
Advanced Threat Protection at GISEC 2015
Fortinet a global leader in high-performance cyber security – today announced that it will be present at the Gulf Information Security Expo & Conference (GISEC), the Middle East’s essential IT Security Knowledge Platform, taking place from April 26 to 28, 2015 at the Dubai World Trade and Convention Center.
FireEye aims for a cultural shift around advanced security
FireEye has announced two solutions that aim to help organisations scale their defense strategies. FireEye as a Service is on-demand …
Confronting malware intelligently
Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.
Gartner names top 10 2014 IT security technologies
Gartner has highlighted its top 10 technologies for information security and their implications for security organisations in 2014.
6 tips to combat Advanced Persistent Threats
Experts say it takes time, training and collaboration to thwart APTs. But with these best practices, you can keep your defenses high.
Is 2014 the time to finally Virtualise Exchange?
Deciding which applications in the data center should be virtualised is an important process, says Alexey Strygin, Senior Solutions Architect, Veeam Software, Middle East
SophosLabs’ trends to watch in 2014
Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
Websense boosts its Triton solution
New features include inline sandboxing defenses, malware isolation, phishing education and new platform support
How Apple is improving mobile app security
In a much-publicized recent case, scientists at Georgia Tech managed to get a specially crafted app that could perform all sorts of malicious activities app-aptly named Jekyll-onto the App Store