Security News & Reviews - Page 2

More Security News

IO-Tahoe

How Io-Tahoe Protects Privacy Using Real-Time Data Discovery

|
PRODUCT ANALYSIS: Data in motion is quickly becoming the target of cyber-criminals seeking to steal private data. Protecting those data streams takes discovery, analytics and intelligence.
storage vendors

Top Storage Companies

|
New-gen data storage, whether on premises or in the cloud, is all about systems providing the correct information for employees on demand while at the same time maintaining data privacy for users at all levels. These requirements are the same for any size enterprise.
1088_MobileDeviceMngSoftware

Top Mobile Device Management Companies

|
BYOD (bring your own device) to work is fast on the way out. There are too many security pitfalls and risks for an enterprise to endure. It's better to invest in a mobile device management system that can handle all devices a company hands out to its employees plus those random rebels who keep...
EU.GDPR.map

GDPR One-Year Anniversary: Data Privacy Still Needs Help

|
TREND ANALYSIS: One year out from the GDPR's enforcement date, research shows personal data privacy is still a hot-button issue, and distrust continues to run high.
CCPA.2020

Law Firm Releases New Data Privacy App for CCPA

|
NEWS ANALYSIS: SixFifty Privacy, provided by Palo Alto law firm Wilson Sonsini, is all about automating processes to comply directly with the new state regulation.
1088_RemoteAccessSoftware

Top Remote Access Software Vendors

|
In selecting a remote access software solution for an enterprise, managers need to study their use cases carefully, because there are a lot of excellent packages available from which to choose.
Consensus.2019

Blockchain, Cryptocurrency’s Future Debated at Consensus Conference

|
TREND ANALYSIS: There is a lot of development going on in blockchain, cryptocurrency, coins and security tokens and distributed ledgers, as vendors look to improve on basic plumbing of blockchain frameworks like Ethereum and Hyperledger or make their own.
Oracle.Screven.2

Security Takeaways from Oracle Media Day Event

|
TREND ANALYSIS: Businesses now realize that cloud vendors provide security functionality that can help defend them from attacks perpetuated by large hacking organizations.
Extreme Networks

Extreme Networks’ Approach to Autonomous Networking Is Elemental

|
PRODUCT ANALYSIS: Extreme lets customers mix and match to evolve to an autonomous network at their own pace.
HyTrust.Cloud.Control2019

HyTrust Launches Full-Scale Security Platform for VMware, AWS, Containers

|
NEW PRODUCT NEWS/ANALYSIS: HyTrust CloudControl 6.0 expands to include VMware vSphere and NSX, the AWS cloud and Kubernetes. The expanded platform addresses problems organizations currently face in trying to secure and ensure compliance of their hybrid, multi-cloud environments efficiently....
Zuckerberg.Facebook.F8-2018

Why It May Be Time to Break Up Facebook

| Updated
UPDATE: With the publication this week of Facebook co-founder Chris Hughes' New York Times article on this topic, eWEEK is re-publishing this Feb. 1 column by longtime Contributing Editor Wayne Rash, which predated Hughes' article by more than two months.
IoT

Regaining Control of Hyperconnected Enterprise Requires Dose of Ordr

|
PRODUCT ANALYSIS: Ordr’s Systems Control Engine uses artificial intelligence to help companies manage and secure IoT deployments.

Enterprise Tech Videos