Cisco Completes Acquisition of IMImobile PLC
By combining IMImobile's solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer.
Citrix Endpoint Management named a 2021 Gartner Peer Insights Customers’ Choice
Citrix Endpoint Management receive an overall rating of 4.5/5.0 stars based on 101 reviews within the Peer Insights category for Unified Endpoint Management, again based on feedback from you, our customers.
Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion (FireEye)
Accellion FTA is a 20-year-old product nearing end of life. Accellion strongly recommends that FTA customers migrate to kiteworks, Accellion’s enterprise content firewall platform. Per Accellion, Kiteworks is built on an entirely different code base.
Proofpoint To Buy Data Protection MSP InteliSecure For $62.5M
InteliSecure will simplify data protection for customers by streamlining policy creation and providing unified event visibility across tools. InteliSecure also will deliver real-time reporting required by key stakeholders and reduce noise to increase focus on critical incidents.
Speed vs. Security: Protecting Modern Apps and APIs at the Pace of Modern Business (F5)
The pace of modern business is driving a wedge between the way applications are developed and how they are protected. By harnessing modern infrastructure and applications, companies can better compete and adapt faster. However, they could also be jeopardizing security.
Fortinet Named a Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for Second Year in a Row
Fortinet believes the recognition from the Gartner Peer Insights Customers’ Choice is further reinforcement of the company’s dedication to delivering consistent security across all networks, endpoints and clouds powered by the highest-performing cybersecurity platform – the Fortinet Security Fabric – to its customers during these challenging times.
The Neapolitan Ice Cream of File and Object Storage (Pure Storage)
Like Neapolitan ice cream, FlashBlade brings together the very best storage for file and object data in one unified storage system.
The Anatomy of the SolarWinds Attack Chain (CyberArk)
By assuming that any identity – whether human or machine – in your network may have been compromised, you can turn your attention to identifying, isolating and stopping threats and gaining privileged access and executing lateral movement, before they can do harm.
Microsoft Lures Populate Half of Credential-Swiping Phishing Emails
Almost half of phishing attacks in 2020 aimed to swipe credentials using Microsoft-related lures – from the Office 365 enterprise service lineup to its Teams collaboration platform.
Multicloud Reserved Instance Management Made Easy with Turbonomic
Turbonomic is designed to unlock the true potential of the cloud by carefully balancing application performance with optimal efficiency by leveraging every discount mechanism offered by the cloud provider.