Recognition & Coverage
Widely Recognized in Cyber Security
We are thought leaders and innovators who are proud to be part of the cyber security community.
CRN 2016 Security 100: 25 Coolest Network Security Vendors
When it comes to a company's security strategy, network security has undergone a major evolution with the advent of next-generation technologies. The inaugural CRN Security 100 list includes network security vendors that offer next-generation firewalls, Internet of Things security, network visibility, cloud security and more. Take a look at 25 of the coolest network security vendors that might benefit from that bump.
Network World 2015 Top 6 Privilege Identity Management Products
Network World selects 6 powerful Privilege Identity Management Products, including BeyondTrust PowerBroker UNIX & Linux. PowerBroker UNIX & Linux takes PIM out of the Windows environment and over to Linux and Unix systems, where it’s sorely needed.
In the News
The 5 Worst Hacks and Breaches of 2016 and What They Mean for 2017
2016 was not a great year for security, at least where high-profile breaches, hacks, and data leaks were concerned. The year saw yet another laundry list of big-name companies, organizations, and websites hit with distributed denial-of-service (DDoS) attacks, huge caches of customer data and passwords hitting the black market for sale to the highest bidder, and all manner of malware and ransomware Opens a New Window. intrusions.
Google Chat App Allo Boasts Strong Encryption — If You Turn it On
Google has announced a new messaging app with strong encryption, meaning that your communications can't be wiretapped. But there's a catch: You have to turn on that feature yourself. The tech titan's plan to launch Allo this summer without encryption by default has drawn withering criticism from some quarters.
Why People Like Edward Snowden Say They Will Boycott Google’s Newest Messaging App
Some tech experts said it is possible to combine end-to-end encryption with the artificial intelligence bot feature. “There’s always a way,” said Morey Haber, vice president of technology at the cybersecurity firm BeyondTrust. Smartphones, for example, could do some of the processing on the device. But, he said, it would be difficult to fully process queries to Assistant without the power of Google’s remote servers, which would need to see the unencrypted queries. “I don’t think the technology is there yet,” Haber said.
Frost & Sullivan: 2015 Global Vulnerability Management Enabling Technology Leadership Award
This executive report focuses on the Retina CS Enterprise Vulnerability Management product line that delivers large-scale, cross-platform vulnerability assessment and remediation, with available configuration compliance, patch management and compliance reporting.