Is Your IT Security Built to Withstand 5G?

by Morey J. Haber  | 

​After many years of promises, we’re finally on the cusp of the 5G era. 5G, a new, cellular wireless technology, is expected to provide connectivity to everything and perform data transfers at speeds that far exceed anything we have seen in the past. It will truly be the golden age of communication, automation, and barring privacy and government restrictions, everywhere and at any time. And the security ramifications will become a potential concern for everyone and everything. This requires particularly careful consideration.

BeyondTrust Named 'Top Innovative Vendor in Secure Identity Solutions’, Recognized for Outstanding Contributions Addressing IT Security in MEA Region

by Astrid Kechichian  | 

Each year, the GEC Awards, which bills itself as “The Grammys, Oscar and Nobel prize of the Tech industry for the MEA region ,hosts a gala. This event assembles the region’s top IT security solution vendors and IT services providers to recognize the most outstanding contributions to the regional IT industry. Last week, in Dubai, BeyondTrust was thrilled to be recognized as Winner of the GEC Awards 2019 – Top Innovative Vendor in Secure Identity Solutions, for our privileged access management platform.

BeyondTrust Privileged Identity Delivers New Functionality & Enhanced User Experience in Latest Release

by Chris Stoneff  | 

BeyondTrust Privileged Identity v5.5.5.0 builds on BeyondTrust’s commitment for revolutionizing the way the world secures and manages privileged access. This version brings a faster and sleeker web application interface and other exciting new features to help your team be more productive, while securing privileged access. Read about highlights of the release.

Recent Posts