Webinar | Security | EUC Anti-virus
Check Point

Mobile devices are the weakest security link in today’s enterprise - 42 million attacks in 2018 alone. Mobile users are three-times more likely to fall for phishing scams, yet relatively few companies...

Read MorePublished: 05/12/2019
Whitepaper | Security | Email
Proofpoint

Data breaches are a rapidly growing problem for businesses worldwide. People-centric threats can jeopardize enterprises even more than technical vulnerabilities.

On behalf of Proofpoint, The...

Read MorePublished: 05/12/2019
Webinar | Security | Web
Forcepoint

APAC: 2020 Cybersecurity Predictions

12 Dec 2019 - 12:00PM SGT; 3:00PM AEDT

Join Forcepoint’s Head of X-Labs, Raffael Marty, and Principal Security Analyst, Carl Leonard, as they discuss our top 5 Cybersecurity Predictions for 2020.

Read MorePublished: 05/12/2019
Whitepaper | Security | Identity Management
OneSpan

Learn more about behavioral biometrics and the fight against application fraud and account takeover fraud.

Read MorePublished: 05/12/2019
Whitepaper | Security | Identity Management
OneSpan

Three legal experts explain why eSign is not enough to keep you out of court. Strong electronic evidence is key, as explained in this report.

Read MorePublished: 05/12/2019
Whitepaper | Security | Firewall IDS IPS
McAfee

Learn how to move further down the path of business enablement through a security platform approach.

Read MorePublished: 04/12/2019
Whitepaper | Security | Firewall IDS IPS
McAfee

The intent of this paper is to present a compilation of the easiest and most prevalent network-based techniques an attacker can use to gain access to systems and data, also popularly known as...

Read MorePublished: 04/12/2019
Webinar | Security | Firewall IDS IPS
McAfee

Container workloads are the natural progression of virtualization and optimized to take full advantage of the benefits of the cloud. MVISION Cloud Container Security provides a container optimized...

Read MorePublished: 04/12/2019
New Product | Security | Unified Threat Management
Sonicwall

Capture Security Center is a scalable cloud security management system that’s a built-in and ready to use component of your SonicWall product or service. It features single-sign-on and...

Read MorePublished: 03/12/2019
Whitepaper | Security | Firewall IDS IPS
Sonicwall

Adopting cloud to improve security — particularly the software-as-a-service (SaaS) model — is a growing trend. But this adoption is not without risks and responsibility for end-user organizations....

Read MorePublished: 03/12/2019
Whitepaper | Security | Email
Barracuda Networks

Protect your business from some of the most sneaky, targeted and expensive types of spear-phishing attacks.

See all the revealing new details about business email compromise (BEC), including...

Read MorePublished: 03/12/2019
Whitepaper | Security | Web
Forcepoint

As the workforce grows more mobile and businesses grow globally, safeguarding only against external threats still leaves your critical data vulnerable. Tuning into the way employees interact with data...

Read MorePublished: 03/12/2019
Whitepaper | Security | Unified Threat Management
IBM

The IBM X-Force Threat Intelligence Index 2019 highlights high-profile security events of 2018 and forecasts trends that will occur in 2019.

The report is comprised of insights and observations...

Read MorePublished: 03/12/2019
Whitepaper | Security | EUC Anti-virus
Kaspersky Lab

All commercial software has some vulnerabilities which can be exploited as a means of introducing malware. The nature of today’s sophisticated software, and the sheer quantity of code involved, means...

Read MorePublished: 03/12/2019
Press Release | Security | Firewall IDS IPS
NEC

NEC Corporation, a leader in the integration of IT and network technologies, today announced the conclusion of a global cyber security agreement with the International Criminal Police Organization...

Read MorePublished: 03/12/2019
Whitepaper | Security | Web
FireEye

The report provides direct insights that will help organizations benchmark their cyber security initiatives, offers data points on leading issues that can be used to support critical decision making...

Read MorePublished: 03/12/2019
Event | Security | Identity Management
Microsoft

In a cloud environment, it’s essential for IT pros to know and implement the latest in security to help protect their organizations’ data. Microsoft is named a leader by Gartner across Access...

Read MorePublished: 03/12/2019
Whitepaper | Security | Web
Imperva

Despite millions of dollars spent on Secure Software Development Lifecycle (SSDLC) programs each year, enterprises are struggling to deliver secure applications within desired timelines. In this...

Read MorePublished: 02/12/2019
Whitepaper | Security | Unified Threat Management
ThreatQuotient

Incident response investigations are complex efforts, shifting between chaos and order, as the incident lead maintains investigation Incident Pruning Thumbnailalignment with incident response...

Read MorePublished: 02/12/2019
Event | Security | SIEM
RSA

RSA Conference 2020 APJ

14 - 16 Jul 2020 - Singapore

In the minute or so that it takes you to read this, more cyberattacks have been launched against organisations just like yours. Think this is unacceptable? We couldn’t agree with you more.

In...

Read MorePublished: 29/11/2019
Show More..
Top
ITUpdate loading
Loading...