37,039 Results for:

  • Sort by: 

VMware acquisition continues move toward cloud security

15 Feb 2018

VMware cloud security tools will get a boost from the company's acquisition of CloudCoreo, a security and management startup focused on cloud deployments. Read More

Tufin Orca automates security for containers and microservices

27 Apr 2018

Tufin's policy-based security automation tool fortifies DevOps environments, as it integrates with CI/CD tools, scans for threats, and secures containers and microservices. Read More

AI cybersecurity tools help spot threats before they cause harm

05 Nov 2018

Security pros are increasingly using AI-based cybersecurity tools to stay one step ahead of hackers and minimize vulnerabilities before they can be exploited by bad actors. Read More

How to secure Azure RDP virtual machine access with a jumpbox

12 Dec 2018

A jumpbox can be a handy tool to improve security in a Microsoft Azure deployment. For starters, it blocks the public IP address automatically associated with any VMs. Read More

Virtualization security tools defend across clouds

01 Dec 2015

Several vendors offer ways to protect virtual machines both in the data center and in the cloud. How do these products differ from what's available from VMware or Amazon Web Services? Read More

The UK manufacturing sector needs a digital upgrade

02 Jul 2019

In this week’s Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer’s guide looks at enterprise ... Read More

Support a guest security policy with endpoint hardening

03 Aug 2018

Guest security relies not only on a series of tools and best practices, but also on a security mindset that starts with endpoint hardening and follows the deployment of every VM. Read More

A guide to SIEM platforms, benefits and features

20 Dec 2018

Evaluate the top SIEM platforms before making a buying decision. Explore how the top SIEM platform tools protect enterprises by collecting security event data for centralized analysis. Read More

How to ensure hyper-converged infrastructure security

10 Jul 2018

To secure data in an HCI system, it requires tools and techniques that account for the unique features of hyper-convergence, such as shared resources and virtualized management. Read More

Readers' top picks for application security tools

01 Dec 2015

The top companies and application security products that organizations consider when they seek to reduce their application vulnerabilities. Read More