Asia's leading source of security and threat news
These search results are from across the Techday network of sites
Digital transformation: Security on the edge
Multi-cloud access, SD-WAN, AI, and IoT, combined with the ubiquity of remote and mobile users, are significantly expanding the attack surface.
Sophos extends endpoint detection offering to servers
By adding EDR to Intercept X for Server, IT managers can investigate cyberattacks against servers, a sought-after target due to the high value of data stored there.
ReFirm Labs launches partner programme
It offers revenue share tiers and incentive programs for its IoT security platform, helping MSSPs and resellers expand customer reach.
inTechnology adds WatchGuard network security to portfolio
InTechnology Distribution will now work with WatchGuard to recruit partners who have traditionally been Wi-Fi specialists.
ExtraHop appoints Tracer Cloud as newest channel partner
ExtraHop’s network traffic analysis across hybrid cloud environments will allow us to rapidly identify top network talkers and network utilisation issues.
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
CrowdStrike: Improving network security with cloud computing solutions
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Network security in A/NZ - OVH
Ensuring operations can be performed at a continuous fast pace will be vital for businesses in 2019.
IDC: 2019 security spending to grow 20% in APeJ
“The Asia/Pacific region recognises that its no longer “under-the-radar” as far as breaches, hacks, and legislation is concerned.”
Trend Micro announces security products for Google Cloud Platform, Kubernetes and Gmail
“It is critical for enterprises to remember that they share in the responsibility of what they put in the cloud.”
AlgoSec launches security and compliance management for multicloud
CloudFlow’s centralised management gives organisations visibility, risk and compliance analysis, and automated detection of misconfigurations.
Sophos offering mobile device management with Microsoft Intune integration
Running on Microsoft Azure, the Sophos integration will enable IT administrators to configure individual device usage policies within Microsoft Intune.
Aerohive achieves ISO/IEC 27001 cloud platform certification
Aerohive is the first cloud-managed networking vendor recognized by a global standard for commitment to information security management systems.
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Cradlepoint debunks common connectivity and security myths
Many misconceptions have arisen, causing businesses to fear adopting new technologies.
LogRhythm launches solution to address network-borne threats
“Security teams are often understaffed, overwhelmed by false positives and lack the necessary network visibility.”
VMware launches service-defined firewall
VMware’s new internal firewall solution locks down known good behaviour at both the network and host level to reduce the attack surface.
Sonicwall announces network, cloud apps, endpoint protection solution
SonicWall introduced new cloud-managed Wi-Fi access points and wireless planning tools designed to ease the deployment of global wireless networks.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
Extreme Networks launches IoT security solution
IoT devices are typically deployed in a flat or unsegmented network so that if breached, the attacker can gain access to sensitive areas of the network.
Safeguarding the home network in the age of connectivity
Financial fraud and identity theft are just some examples of the things that can happen due to a breach.