Cloud Security

How Is Ericsson Advancing Enterprise Wireless Technology Post-rebrand?
Infrastructure & Network Security How Is Ericsson Advancing Enterprise Wireless Technology Post-rebrand?

Ericsson’s rebranding from Cradlepoint to Ericsson Enterprise Wireless Solutions marks a significant evolution in the company's approach to enterprise wireless technology. This shift not only reflects a strategic alignment with Ericsson's broader mission but also underscores the company's

How Will iomart’s Acquisition of Atech Impact Its Cloud Services?
Infrastructure & Network Security How Will iomart’s Acquisition of Atech Impact Its Cloud Services?

iomart, the Glasgow-based cloud computing firm, recently announced its acquisition of Kookaburra Topco, the holding company of Atech Support, for £57 million. The purchase, financed through iomart's existing cash reserves and an increased £125 million revolving credit facility, is designed to

How Are NetApp's Cloud Partnerships Transforming Enterprise Storage?
Infrastructure & Network Security How Are NetApp's Cloud Partnerships Transforming Enterprise Storage?

Over the past few years, NetApp Inc. has embarked on a significant transformation, shifting from a company primarily centered on hardware solutions to one that embraces comprehensive cloud technologies. This strategic pivot has been marked by partnering with major hyperscalers like Amazon,

Why Is Bitdefender a Visionary in Endpoint Protection Platforms?
Endpoint & Device Security Why Is Bitdefender a Visionary in Endpoint Protection Platforms?

Bitdefender has carved a niche for itself in the cybersecurity landscape, consistently being recognized for its innovation and effectiveness. Recently, Bitdefender's designation as a Visionary in the 2024 Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) has reaffirmed its leading

How Will Portnox's Integration with Microsoft EAM Boost Security?
Identity & Access Management How Will Portnox's Integration with Microsoft EAM Boost Security?

In a substantial move towards enhancing cybersecurity, Portnox, a leading provider of cloud-native, zero trust access control solutions, has announced the integration of Microsoft External Authentication Methods (EAM) into their Conditional Access for Applications solution. This strategic

Which Cyber Threat Hunting Tools Will Dominate in 2024?
Malware & Threats Which Cyber Threat Hunting Tools Will Dominate in 2024?

In today's rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated. As organizations worldwide strive to protect sensitive data and secure their digital infrastructures, the need for advanced cybersecurity measures becomes paramount. Proactive solutions such as

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later