Cyber criminals exploit new vulnerabilities before they can be patched, consistently outpacing the efforts of vendors, says John Mc Loughlin, CEO of J2 Software.
HYPR is proficient in providing a versatile and customisable authentication experience, says Patrick Assheton-Smith, CEO of Symbiosys IT.
Lenovo to feature CyberArk Endpoint Privilege Manager as the first identity security offering within its ThinkShield security portfolio.
Companies need to define the business problem of a possible cyber security breach, and recognise the need for multiple layers of defence.
Real-world cases of cyber attacks in SA will be examined, with valuable insights into endpoint security strategies provided.
The company has received official accredited status from the UKAS to the revised international standard for information security management, ISO/IEC 27001.
Microsoft Azure is built from the ground up, with security, compliance and privacy as foundational pillars, says Hilton Ashford, cyber security architect at BUI.
To successfully combat money laundering and financial crime, banks must get to the root cause of how these crimes can go undetected, says iiDENTIFii.
NEC XON's next-generation extended detection and response solutions elevate the security posture through advanced automation and intelligence.
Illumio's Zero Trust Segmentation solution denies access to applications and devices unless they are specifically required for operations.
By leveraging agentless and proxyless technology, Silverfort integrates into Altron Security's existing IAM solutions.