Security News

  • Using Dependency Modeling For Better Risk Decisions

    | Q&A with Open Group executives who are evangelizing a new standard for dependency modeling to help with IT risk management and beyond

  • NSA Director: Information-Sharing Critical To U.S. Cybersecurity

    | NSA Director and U.S. Cyber Command chief Gen. Keith Alexander discusses challenges to protecting U.S. interests in cyberspace

  • Should Cloud Providers Secure Their Outbound Traffic?

    | As attackers focus on using hosted or virtual servers to power their denial-of-service attacks, calls for a cleaner cloud may become louder

  • Too Scared To Scan

    | Fear of business disruption and downtime often leaves enterprises hesitant to scan the critical applications that hackers are most likely to target in their quest for exploitable vulnerabilities

  • Misconfigured, Open DNS Servers Used In Record-Breaking DDoS Attack

    | Biggest-ever distributed denial-of-service attack originally aimed at Spamhaus escalates and hits other corners of the Net

  • Healthcare Security Improving But Still Needs Treatment

    | First quarter year-over-year data breach numbers declined in 2013, but data security black eyes still a symptom of healthcare's need for improved database security

Websense Mobile Security

Websense TRITON Mobile Security is the only cloud-based security solution that extends your existing security policies to mobile devices to help secure your data, reduce your risk and enable your business — wherever you and your employees go.

See all
Trendmicro Deep Security

Delivers comprehensive, adaptive, highly efficient agentless and agent-based protection, including anti-malware, intrusion detection and prevention, firewall, web application protection, integrity monitoring, and log inspection.

See all
Popular Trainings
Certified Ethical Hacker (CEH)

CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals

Certified Information Systems Security Professional (CISSP)

CISSP® certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security

Websense® Web Security Gateway provides the defenses you need to defend against advanced attacks:

real-time threat analysis at web gateways, plus forensic reporting.

Request a Demo

Consolidate your endpoint and mobile security with a unified management infrastructure

offers global threat intelligence to stop malware in the cloud, and provides virtual patching against zero day threats, and optimized security for virtual desktops.

Request a Demo

Manage two-factor authentication security, security tokens, and users

across the enterprise with RSA SecurID, the world's leading two-factor solution

Request a Demo

GFI LanGuard® acts as a virtual security consultant offering

Patch management, Vulnerability assessment, and Network auditing. It also assists you in asset inventory, change management, risk analysis and proving compliance.

Request a Demo