Ping Identity introduces PingOne for groups

Ping Identity®, The Identity Security Company™, has announced PingOne for Groups. Built on the PingOne cloud identity management service, PingOne for Groups is simple enough for small- and medium- sized organisations, and secure enough for enterprise departmental single sign-on (SSO) needs. PingOne for Groups is a free subscription for up to five applications and 50 users. It provides secure SSO in minutes, and offers a seamless upgrade path to PingOne for Business or PingOne for...

Read More


GFI Software adds another layer of security

Latest enhancement makes GFI one of the industry’s leading vendors offering antivirus, patch management and Web protection from a single, cloud-based solution.

Read More


Beta release of Red Hat Enterprise Linux 6 now available

To keep pace with the demand for enterprise-class infrastructure, the newest version of the leading Linux platform, the beta release of Red Hat Enterprise Linux 6.5, extends its scalability and manageability to aid in the build-out and control of large, complex IT environments. For example, Red Hat Enterprise Linux 6.5 will be designed to simplify the operation of mission-critical SAP applications by automating the optimal configuration of common SAP deployments.

Read More


Toshiba to ‘bundle’ Becrypt Security with its mobile devices to target key markets...
The intelligent use of IT budgets to drive innovation and support services is key for business...
Bromium has revealed the results of its “State of Security Report Card,” a survey of...
Okta, the leading identity and mobility management company, has secured $75 million in new...
Bromium and Microsoft collaborate to ensure Bromium security solutions are supported on Windows 10,...
New service protects healthcare databases and applications, reducing the scope of compliance and...
Latest Video

Ferrari: A New Perspective on Cybersecurity

Ferrari took a strategic decision to choose Kaspersky Lab as their IT Security provider. They wanted to introduce more stringent IT security measures, both to protect their core business and to ensure an increase in safety. Find out more in this exclusive video.

Read more