Topic: Security - Page 116
Enterprise Connect 2018: Masergy Makes UCaaS Provisioning Easy with Automation for Communications User Management
User profiles can be managed seamlessly to improve productivity
First HIPAA Compliant Medical Mouse
Seal Shield continues to innovate in the Infection Control Technology Field
Cybercriminals using new monetization techniques to profit from mobile advertising Trojans
Kaspersky Lab issued its annual “Mobile Malware Evolution” report, which found that mobile advertising Trojans, the top mobile malware threat from 2016, went into decline in 2017.
OPAQ Networks Integrates Network Microsegmentation into Security-as-a-Service Cloud
Software-Defined Network Segmentation Provides Comprehensive Visibility and Control to Prevent Lateral Attacks, Contain Breaches and Quarantine Hosts
Reinvent Offers Robocall Blocking Service to Private-Label Reseller Partners
Subscription Service Helps Businesses Avoid Unwanted & Malicious Calls
Soliton Cyber & Analytics Announces a New Network Access Control Tool
NetAttest LAP One is designed to give SMBs easy, simple, and affordable network access control for all active and connected network devices, including IoT.
D&H Introduces Cisco Meraki Enablement Program
The new Driven for Cisco Meraki program is designed to provide all of the resources channel pros need to sell and support Meraki networking, security, and mobility management solutions, and enjoy elite-tier benefits in Cisco’s partner program.
RapidFire Tools Ships GDPR Compliance Auditing Tool
The virtual software appliance is designed to help MSPs and internal IT departments confirm that end-user environments comply with the European Union’s new data privacy regulation, which goes into effect in May.
New Trustwave Report Shows Disparity Between IoT Adoption and Cybersecurity Readiness
Trustwave and Osterman Research Survey Reveals IoT Adoption and Security Practices are Misaligned
SentinelOne Integrates Endpoint Protection Across Fortinet’s Suite of Solutions
SentinelOne Fortinet Connector Empowers Customers to Configure and Enforce Network Access Control on All Endpoints