Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Trend Micro Secures the Cloud

E-mail Print PDF
Trend Micro Secures the Cloud

Trend Micro launches a means to simplify hybrid and multi-cloud security-- Cloud One, a security services platform covering  workload, container, file object storage, serverless and application, and network security, as well as security posture management.

According to the company, Cloud One allows customers to migrate existing applications to the cloud, deliver cloud-native applications and achieve cloud operational excellence. It includes a leading security service already in use by "thousands" of organisations, and is complemented by enhanced container security and offerings ensuring cloud infrastructure is optimally configured.

Read more...

IDC: "Solid Growth Ahead" for Security

E-mail Print PDF
IDC:

Global spending on security products is to reach $106.6 billion in 2019, a 10.7% increase over 2018, IDC reports, and such solid growth is set to continue over the next 5 years as organisations continue to invest in solutions to meet a wide range of security threats and requirements.

Spending should grow to $151.2 billion by 2023 with a CAGR of 9.4% for the 2019-2023 forecast period.

"The market for cybersecurity products continues to grow, growth that is renewed and reinvigorated by a C-level focus on Trust. Today's new trust environment introduces new variables that go beyond the traditional ideas of security, risk and compliance, introducing concepts of privacy and ethical business operations," the analyst says. "Trust is addressed in consideration of the relationships (B2B, B2C, B2E and G2C) and the attributes of interaction (people, technology, organization, culture and process). Given the complexity of implementing Trust, cybersecurity vendors are the clear beneficiaries."

Read more...

Ponemon: Attacks on SMBs on the Rise

E-mail Print PDF
Ponemon: Attacks on SMBs on the Rise

SMBs see a "significant" increase in targeted cybersecurity breaches for the 3rd consecutive year, Ponemon reports, with attacks growing across business in Europe, the UK and US in terms of both frequency and sophistication.

The findings come from the 2019 Global State of Cybersecurity in Small and Medium-Sized Businesses report, a survey commissioned by Keeper Security measuring the responses of 2391 IT and security practitioners in the US, UK, DACH, Benelux and Scandinavia. Of the number, 45% say the posture of their organisations regarding IT is "ineffective," while 39% lack an incident response plan.

On a global basis, 66% of respondents report attacks taking place over the past 12 months. Attacks are becoming increasingly sophisticated, with phishing (57%), compromised or stolen devices (33%) and credential theft (30%) as the most common attacks used against SMBs globally. In addition, 63% of businesses report an incident involving the loss of sensitive information about customers and employees in the past year.

Read more...

The Implications of Quantum Computing With Sectigo

E-mail Print PDF
The Implications of Quantum Computing With Sectigo

Quantum computing is all but set to transform the IT industry-- and to help enterprises prepare for such change, Sectigo offers a set of 15 educational resources for security professionals in the form of a white paper, podcasts and articles.

The computing architecture takes advantage of quantum mechanics to deliver capabilities beyond what is possible using traditional binary computing. However, quantum computers are destined to render the cryptographic underpinnings of current digital systems insecure once they reach a certain level of maturity. After all, quantum computers are (at least in theory) highly effective at factorising numbers, making them extremely capable at breaking the RSA and ECC (Elliptic Curve Cryptography) underpinning digital systems. And no, increasing key sizes is not a viable solution. Instead, Public Key Infrastructure (PKI) systems need to migrate to quantum-resistant encryption algorithms before quantum computers break current encryption methods.

Read more...

ALSO Adds CYE to Security Platform

E-mail Print PDF
ALSO Adds CYE to Security Platform

The ALSO security platform gets a solution from another provider with the Cybersecurity Intelligence SaaS Platform from CYE-- Hyver, a combination of advanced AI and services delivered by leading security experts.

Available to resellers via the ALSO Cloud Marketplace, the Hyver platform provides customers with improved security posture and automated remediation across the entire organisation. It promises a combo of both learning artificial intelligence and predictive analytics with comprehensive human expert knowledge to provide extensive protection to business infrastructure. It exploits real-life attack scenarios driven by continuous red-team assessments, without disrupting business processes.

Read more...

Page 5 of 67