Onum delivers true real-time visibility, context and control over data-in-motion, says Solid8 Technologies.
Press release
Client content
Timeline
2025
May
- 21.
- 21.The collaboration aims to respond to and combat the region’s growing cyber threat landscape.
- 21.The Tenable white paper explains how manufacturers first began using computer systems to manage and control production processes.
- 20.Owning your storage infrastructure means clear budget predictability, asset value and performance control, says Nexsan.
- 20.Radware supports a network of more than 50 cloud security service centres worldwide with a mitigation capacity up to 15Tbps.
- 20.Geopolitics, growing threat surface and AI tech drive bigger, longer, more intense attacks.
- 20.Raiffeisen Bank International, based in Austria, deployed Cymulate's security detection validation tool.
- 19.There are significant flaws in existing deepfake detection tools and a growing demand for solutions that are more adaptable and resilient.
- 19.The 2025 E-commerce Bot Threat Report details rise in bot attacks, emerging threat vectors and shifting defence strategies.
- 19.The partnership aims to deliver real-time detection of suspicious behaviour and deep correlation across DNS, DHCP and Active Directory logs.
- 16.CASA Software and Veracode will be on hand at this year’s ITWeb Security Summit to discuss AI and the future of application security testing.
- 15.At this year's ITWeb Security Summit, Obscure Technologies and partner Okta will discuss the challenges of the digital economy and how they can be met.
- 15.The company will expand on a case study at this year's summit.
- 15.Nexsan solution, Assureon, has patent-pending technology that protects and assures the integrity of information assets that it has archived.
- 14.GenAI-based security technologies can help surface higher priority risks and drive automated response procedures.
- 13.Solid8 and AlgoSec present their newly formed partnership at the summit, forged in response to the unexpected closure of Skybox Security earlier this year.
- 13.Championing partner success, empowering enterprise resilience and transforming cyber security across Africa.
- 13.At the summit, Cymulate will highlight the importance of validating cyber security defences before attacks take place.
- 13.Rubrik DSPM offers seamless deployment and comprehensive data visibility, eliminating the need for manual data discovery, says Obscure Technologies.
- 13.The line between authentic and manipulated evidence is blurring and the challenge of proving authenticity is crucial.
- 12.The platform enables real-time detection of malware infections, attribution of attacker campaigns and retrieval of exfiltrated data.
- 9.Risk Manager’s risk remediation dashboards track progress across applications and business units to highlight critical metrics.
- 9.The Hackensack Radiology Group in New Jersey, USA, has implemented Nexsan’s Assureon solution.
- 8.Security and DevOps teams face a growing number of entities to secure as companies adopt cloud-native approaches, says Obscure Technologies.
- 8.Threat intelligence is data that has been collected, analysed and enriched to help organisations make decisions.
- 8.Ransomware as a service is a business model where ransomware operators and third parties work together to launch ransomware attacks.
- 8.An Arctic Wolf survey looks at CISOs’ security challenges in the cloud and how managed service providers can help.
- 8.Cymulate showcases four best practices to take control of your CTEM at ITWeb Security Summit 2025, in Cape Town.
- 8.At least seven out of 10 organisations believe their sensitive data was compromised or breached in the past 12 months.
- 8.Arctic Wolf believes two forces will exert influence on tomorrow’s threat landscape: adversaries’ ability and willingness to adapt, and their propensity for financial gain.
- 7.Without robust security measures in place, AI infrastructure remains vulnerable to threats such as data leakage or fraud, says Arctic Wolf.
- 7.Read the full case study on this implementation here.
- 7.The report focuses on cyber attacks that escalated to a level requiring an incident response investigation by Arctic Wolf.
- 7.A proactive approach to cyber security drives significant business value beyond the prevention of financial and reputational damage from cyber incidents, says Gilchrist Mushwana, head of cyber security at BDO South Africa.
- 6.The Nedbank cyber security team wanted to replace its manual, resource-heavy cyber security processes to improve its protection from the latest active threats.
- 2.Solid8 will showcase Saviynt’s Identity Cloud platform – a solution designed to future-proof digital ecosystems in an age of AI-driven threats.
- 2.SURF enables companies to gain deep visibility and control over browser activity, whether users are on managed or BYOD devices, working from the office or remotely, accessing corporate SaaS or internal web apps.
April
- 30.The collaboration aims to deliver secure browsing solutions that safeguard data integrity, privacy and productivity in an increasingly complex threat environment.
- 30.The companies will highlight one of Nexsan’s global customer success use cases at the California Institute of Technology.
- 29.Companies need a high-density and energy-smart storage solution.
- 25.The partnership will focus on equipping African companies with tools to defend against identity-based cyber attacks, which are increasingly targeting Active Directory.
- 25.An identity security fabric is a unified framework for securing, managing and governing both non-human and human identities across ecosystems at scale.
- 25.Auth for GenAI, part of the Auth0 Platform, is a suite of features that enable developers to integrate secure identity into GenAI applications.
- 24.Companies will gain access to LimaCharlie's SecOps Cloud Platform, which delivers core cyber security capabilities as flexible, on-demand services.
- 24.Discover Armata Cyber Security’s AI-powered services at ITWeb Security Summit.
- 24.The Businesses at Work report analyses anonymised data across thousands of customers in the Okta Integration Network.
- 24.Okta provides a unified approach to securing service accounts and other non-human identities, ensuring they receive the same level of governance, security and control as human identities.
- 23.Cyber security in the age of AI is a key topic for the forthcoming ITWeb Security Summit, to be held in Cape Town and Johannesburg.
- 16.The companies will showcase Tenable's AI-powered exposure management platform at this year's ITWeb Security Summit.
- 16.Nexsan Assureon, when integrated with Unity, provides immutable storage, ensuring that data remains unchanged and secure from tampering.
- 16.Exposure validation helps companies to go further than traditional BAS and automated penetration testing solutions.
- 7.Obscure Technologies is a platinum sponsor at this year’s ITWeb Security Summit, and will showcase its global zero trust data security partner, Rubrik.
- 4.A comprehensive toolkit for safeguarding data has become non-negotiable in a world where secure immutable storage can be the first and last line of defence, says Byron Horn-Botha, senior sales specialist at CASA Software.
March
- 31.Cybereason’s MDR solution is a fully managed detection and response security solution that provides proactive threat hunting, detection and remediation.
- 26.Detection and response solutions have advanced to address the constantly evolving sophistication of cyber attacks.
January
- 16.This year marks the 20th anniversary of the annual ITWeb Security Summit, an event that has evolved alongside technology trends shaping the future of cyber security.