Proofpoint acquires insider threat intelligence firm ObserveIT in $225 million deal
ObserveIT provides solutions for real-time enterprise network management, alerts when suspicious behavior is detected, and also assists firms in cybersecurity-related legal compliance.
Coming Soon: New NetApp integrations
Veeam Availability Orchestrator v2 brings brand new DR possibilities – including the ability to achieve real DR from backups – with extreme operational efficiencies.
Android bug lets hackers plant malware via NFC beaming
The good news is that NFC connections are initiated only when two devices are put near each other at a distance of 4 cm (1.5 inches) or smaller. This means an attacker needs to get his phone really close to a victim's, something that may not always be possible.
Check Point Software Technologies Announces Integration of CloudGuard with Microsoft Azure Security Center
The integration adds to numerous existing integrations between Check Point and Microsoft products, including CloudGuard integration with Azure Sentinel and SandBlast Mobile integration with Microsoft Intune.
Transform employee experience with Microsoft Teams and Citrix Workspace
The Citrix Assistant for Microsoft Teams is one unifying bot across all your apps, so it eliminates the need to build or integrate multiple bots for your custom on-prem apps and SaaS apps. This means end users can use natural language queries to get answers and key insights without switching between multiple bots or switching to multiple apps.
Liquidware Sees Early Microsoft WVD Traction; Shows Solutions at Ignite
Ken Phelan, CTO of Gotham Technology Group, a Microsoft and Liquidware channel partner, stated, "Microsoft has been a core part of Gotham’s focus for many years. We are excited for the release of WVD and how we can better support customer environments with it. The ability to leverage the Liquidware solution stack alongside WVD is a tremendous benefit to not only Gotham but our enterprise customers."
IGEL, Citrix and Ingram Micro Offer Combined Solution to Simplify Access to Azure-Delivered Cloud Workspaces
“With our combined solution, IGEL, Citrix and Ingram Micro are making it easy to streamline end user computing in Azure to power cloud-based Windows Virtual Desktops that will simplify endpoint management, improve security, lower costs and keep workers productive,” said IGEL North America President and CEO, Jed Ayres.
US Postal Service To Use Nvidia GPU Servers For AI Mail Processing
One of the first use cases will involve improving the speed and accuracy of recognizing package labels, which will improve the speed of package delivery and reduce the need for human involvement, according to Nvidia.
Driven by Data – Aston Martin Red Bull Racing and Citrix Renew Partnership
With Citrix technology, Aston Martin Red Bull Racing can access high-powered computing resources from anywhere in the world. This flexibility has proved vital in delivering the Team’s successes. A modern F1 team is a distributed and collaborative network that places an incredibly high value on speed and responsiveness.
McAfee MVISION Cloud Is Now a Certified Data Loss Prevention Provider for Microsoft Teams
McAfee announced its cloud access security broker (CASB) technology is now Certified for Microsoft Teams. McAfee MVISION Cloud is now Certified for Microsoft Teams to serve the needs of partners and customers with a unified, cloud-native security platform that consistently protects their data and defends against threats in the cloud.
Arctic Wolf Networks Ranked Number 25 Fastest Growing Company in North America on Deloitte’s 2019 Technology Fast 500™
Arctic Wolf Networks today announced it ranked 25 on Deloitte’s Technology Fast 500™, a ranking of the 500 fastest growing technology, media, telecommunications, life sciences and energy tech companies in North America now in its 25th year. Arctic Wolf Networks grew 4327.36% during this period.
How Do You Prioritize Risk for Privilege Access Management?
The privilege-related attack surface is often much broader than anticipated. So before you get started with any PAM deployment, there’s one big question you need to answer: How Do You Prioritize Risk?