Topic: Security - Page 144
Lexmark and Intelligent ID announce end-to-end solution that provides insider security threat protection
LEXINGTON, Ky., May 31, 2017 /PRNewswire/ —
CrowdStrike Extends Falcon Platform with Enhanced Cloud and Data Center Coverage
— Company offers maximum protection and best-in-class performance for servers in all data center deployment models —
Acronis Adds Anti-Ransomware and Blockchain Features to Business Data Protection Platform
The new Acronis Backup 12.5 includes a host of additional enhancements, and is the first release to come in both standard and advanced editions.
Axis Launches New Range of Positioning Cameras
The visual, bispectral, and thermal positioning cameras enable surveillance across large sites with fewer cameras.
RapidFire Tools Adds New Reporting Capabilities to Network Detective Security Module
The new Data Breach Liability Report quantifies financial risk of personal data on the network.
Pax8 Now Offering Symantec VIP to Service Providers in North America
The cloud-based authentication service from Symantec provides protected access to data and applications.
Cisco IoT Threat Defense: New Architecture and Services Solution to Secure IoT Devices
The new solution segments the network to secure vital services such as connected medical care, electric utilities, and manufacturing.
Barracuda Releases Free Public Cloud Network and Application Security Solutions for AWS and Azure
Cloud-ready program offers seamless transition to the cloud with new 90-day free trial. †
Ask an ASCII Member: What Are BYOD’s Biggest Risks?
In the debut edition of an occassional series, ChannelPro asks veteran IT providers from membership organization The ASCII Group to sound off on what their customers should be worried about when it comes to using personal devices at work.
Netwrix Introduces Free Add-on to Strengthen the Security of Cisco Network Infrastructures
Add-on for Cisco network devices further extends the visibility provided by Netwrix Auditor and enables customers to identify and block threats to their network infrastructures

