August 2015 – Security

eset study

ESET Report gets granular on cyber security knowledge, behavior and attitude in Asia

According to the Asia Cyber Savviness Report, released by ESET, 93% of online users in Asia worry about cyber security. In its recent report, the global provider of security solutions highlights that the region still has a long way to go in understanding online security and protecting themselves.

ESET Report gets granular on cyber security knowledge, behavior and attitude in Asia Read More »

forst

Frost & Sullivan identified top performers of the Asia Pacific Web Application Firewall market

The Asia Pacific Web Application Firewall (WAF) market grew 34% in the past two years, reaching a total market size of $155.6 million in 2014, according to the analysts of Frost & Sullivan. The strong growth momentum was driven by the rise in eCommerce and Internet banking activities over the past few years and the

Frost & Sullivan identified top performers of the Asia Pacific Web Application Firewall market Read More »

sensetive

Sensitive credentials are the keys to large amounts of critical data, according to hackers

“In today’s cybersecurity arena, the notion of using a traditional perimeter firewall as your primary line of defense is no longer the impenetrable wall it used to be, as hackers and malicious actors consistently find ways to sneak past the first trusted layer of defense”, states Thycotic, a provider of smart and effective privileged account

Sensitive credentials are the keys to large amounts of critical data, according to hackers Read More »

760355

Prevent data loss, security and compliance breaches by controlling every file that passes through your mobile devices

Vaultize, a leader in enterprise file security, provides a mobile content management (MCM) platform facilitated through data access rights that allows corporate IT to prevent data loss on their mobile devices. In fact, Vaultize allows granular control over every file that passes through it, including whether files can be copied/pasted, shared, printed, emailed or opened

Prevent data loss, security and compliance breaches by controlling every file that passes through your mobile devices Read More »

2web

Deloitte reveals the top challenges of Chief Information Security Officers (CISOs)

“An effective CISO can no longer rely on his or her technical expertise alone. They must understand how strategic initiatives create risks and develop security programs that balance the need to drive business performance with the growing realities and complexities of protecting customers, intellectual property, and brand”, explains Ed Powers, principal, Deloitte & Touche LLP

Deloitte reveals the top challenges of Chief Information Security Officers (CISOs) Read More »

acronis

Acronis provides complete protection both locally and in the cloud

Acronis, a global leader in new generation data protection, just announced the release of Acronis True Image Cloud and Acronis True Image 2016. Powered by the AnyData Engine and set apart by its image technology, Acronis delivers easy, complete and safe file access and sharing, as well as backup and recovery of all files and

Acronis provides complete protection both locally and in the cloud Read More »