As identity-first security continues to fail, WinMagic, a cybersecurity innovator known for pioneering full-disk encryption and secure endpoint authentication, calls for a structural shift in online ...
Logan G. Harbaugh is a longtime technology journalist with experience reviewing a wide range of IT products. Every week, there are new reports of data breaches at organizations of every type.
Check Point Software Technologies responded to the mobility trend by offering three secure communications products. For starters, Check Point has its IPSec VPN Software Blade for remote access. Scott ...
Endpoint encryption is heralded as one of the cornerstones to securing data and complying with data protection regulations, but it introduces new challenges which can result in costly mistakes.
Trend Micro announced that it is acquiring Mobile Armor, an endpoint encryption company. Enterprise security teams can use this transition as an opportunity to prioritize strategic requirements for ...
Pointsec Mobile Technologies last week released software designed to restrict or block data transfers over various ports on a mobile device. The new release of Pointsec Device Protector adds optional ...
Encryption of data at rest is essential for securing portable endpoints (e.g. laptops) in the event they are lost, stolen or inappropriately decommissioned. It isn’t optional; it’s a fundamental ...
LONDON--(BUSINESS WIRE)--The latest market research report by Technavio on the global encryption management solutions market predicts a CAGR of around 14% during the period 2018-2022. The report ...