Recognition & Coverage
Widely Recognized in Cyber Security
We are thought leaders and innovators who are proud to be part of the cyber security community.
CRN 2016 Security 100: 25 Coolest Network Security Vendors
When it comes to a company's security strategy, network security has undergone a major evolution with the advent of next-generation technologies. The inaugural CRN Security 100 list includes network security vendors that offer next-generation firewalls, Internet of Things security, network visibility, cloud security and more. Take a look at 25 of the coolest network security vendors that might benefit from that bump.
Network World 2015 Top 6 Privilege Identity Management Products
Network World selects 6 powerful Privilege Identity Management Products, including BeyondTrust PowerBroker UNIX & Linux. PowerBroker UNIX & Linux takes PIM out of the Windows environment and over to Linux and Unix systems, where it’s sorely needed.
In the News
Google Chat App Allo Boasts Strong Encryption — If You Turn it On
Google has announced a new messaging app with strong encryption, meaning that your communications can't be wiretapped. But there's a catch: You have to turn on that feature yourself. The tech titan's plan to launch Allo this summer without encryption by default has drawn withering criticism from some quarters.
Why People Like Edward Snowden Say They Will Boycott Google’s Newest Messaging App
Some tech experts said it is possible to combine end-to-end encryption with the artificial intelligence bot feature. “There’s always a way,” said Morey Haber, vice president of technology at the cybersecurity firm BeyondTrust. Smartphones, for example, could do some of the processing on the device. But, he said, it would be difficult to fully process queries to Assistant without the power of Google’s remote servers, which would need to see the unencrypted queries. “I don’t think the technology is there yet,” Haber said.
Point/Counterpoint: The Current State and Future of Biometrics - Part One
In this two-part Q&A, Morey Haber and John Masserini discuss the current and future state of biometrics. Industry thought leaders, Haber and Masserini address leading questions surrounding biometrics from the vendor and enterprise perspective.
Why Can’t the Public Security Sector and the Government Get Along?
The government has unique access to cyber threat indicators and information, and information of this nature is challenging to share with the private sector in real time. Although the DHS has put the structure in place to overcome this obstacle without enabling technologies like STIX and TAXII, Automated Indicator Sharing (AIS) is still challenged to provide real time dissemination of relevant and actionable cyber threat indicators between the public and private sector.
Frost & Sullivan: 2015 Global Vulnerability Management Enabling Technology Leadership Award
This executive report focuses on the Retina CS Enterprise Vulnerability Management product line that delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.