Topic: Hardware - Page 48
ATEN Secure KVM Switch Series Isolates Each Computer Source and Security Classification, While Sharing Multiple Peripherals
18 New Secure KVM Switches Achieve NIAP Certification and PSS PP v3.0 Compliance
AppRiver Buys Roaring Penguin
The acquisition, which buttresses AppRiver’s presence in the Canadian market and adds new capabilities to its anti-spam offerings, is the first step in a larger effort to become a global player in cloud-based software and services.
Gartner Says Worldwide IoT Security Spending Will Reach $1.5 Billion in 2018
By 2021, Regulatory Compliance Will Become the Prime Influencer for IoT Security Uptake
BlackBerry and Microsoft partner to empower the mobile workforce
Companies deliver seamless Mobile App experience and policy compliance; BlackBerry Secure platform now available on Azure
Exabeam Tackles Compromised IoT Threat
New Entity Analytics Product Uses Machine Learning to Flag Suspicious Device Behavior
First HIPAA Compliant Medical Mouse
Seal Shield continues to innovate in the Infection Control Technology Field
Cybercriminals using new monetization techniques to profit from mobile advertising Trojans
Kaspersky Lab issued its annual “Mobile Malware Evolution” report, which found that mobile advertising Trojans, the top mobile malware threat from 2016, went into decline in 2017.
D&H Introduces Cisco Meraki Enablement Program
The new Driven for Cisco Meraki program is designed to provide all of the resources channel pros need to sell and support Meraki networking, security, and mobility management solutions, and enjoy elite-tier benefits in Cisco’s partner program.
RapidFire Tools Ships GDPR Compliance Auditing Tool
The virtual software appliance is designed to help MSPs and internal IT departments confirm that end-user environments comply with the European Union’s new data privacy regulation, which goes into effect in May.
New Trustwave Report Shows Disparity Between IoT Adoption and Cybersecurity Readiness
Trustwave and Osterman Research Survey Reveals IoT Adoption and Security Practices are Misaligned