Archive for: Security

ZONE SE7EN > Blog > Security

post cover

From Compliance to Information Governance: Reducing Costs and Improving Security for Organisations

By Paul Hampton, Director of Product Marketing, Alfresco Businesses are increasingly concerned about compliance with the myriad standards, agreements, regulations, legislation and mandates governing their industries.  But compliance is simply a ticking of a box.  Software standards met – check.  Licensing agreement honoured – check.  Record’s management mandate met – check. Organisations should instead focus […]

post cover

ZONE SE7EN’s Privileged Access Management Roundtable Now Live!

ZONE SE7EN today launch the post event content to our live Privileged Access Management (PAM) Insight Zone Roundtable sponsored by our Platinum sponsor, Dell Security and our Gold sponsor Thycotic, together with speakers from the Cyber Management Alliance, RBS, King and Quocirca. All experts in their field, the exciting Roundtable delivered an informative, lively debate on […]

post cover

New Report Finds Mobile and IoT Devices Yet to Become Targets for Data Attacks

Verizon’s annual 2016 Data Breach Investigation Report (DIBR) has highlighted that mobile and IoT devices are still not considered a factor in real-world data attacks, and are still a low priority. The reports looks at emerging trends and patterns in data breaches worldwide.  Verizon analysed over 100,000 security incidents and included third-party data from approximately […]

post cover

Nexsan Release UNITY – A Unified Storage Solution with Secure Enterprise File Sync and Share

A global leader in unified storage solutions, Nexsan, has released UNITY, a next-generation storage solution that combines scalability, performance, Flash and DRAM together with data mobility support and private cloud file system synchronisation.  The latest features that have been added to universal connectivity for Ethernet, SAS and Fibre Channel, as well as services including SAN […]

post cover

Alfresco Makes Managing Classified Content Easier

Leading open-source Enterprise Content Management (ECM) and Business Process Management (BPM) solution providers, Alfresco Software, have announced the latest improvements to their Alfresco Records Management solution that increases security and simplifies the management of classified content, especially for large-scale deployments such as government agencies. Alfresco Records Management 2.4 is the only open-source solution that is certified […]

post cover

Panama Papers – What Happened to Privileged Access Management?

If you haven’t heard or read about the Panama Papers data leak over the last few days, you’ve either been on a remote island in the South Pacific or you’ve had your head in the clouds.  The data breach of law firm, Mossack Fonseca, where a multitude of documents were leaked to a reporter in […]

post cover

WP Engine Brings Two-Factor Authentication to their User Portal

WP Engine, the solution that powers digital experiences for applications and websites built on WordPress, has announced that they are introducing two-factor authentication for their User Portal, delivering an additional level of security for managed hosting customers. With WordPress powering almost 23% of the web, adding two-factor authentication has increased the security features on their platform […]

post cover

Bomgar Improves their PAM Solution

Bomgar, leaders in secure access solutions, has announced the release of the updated version of their Privileged Access Management (PAM) solution.  The latest version, Bomgar Privileged Access Management 15.3,  improves security and allows security personnel to control, monitor, manage and audit access to critical systems by third-party and privileged users. Bomgar’s PAM solution allows businesses to quickly control […]

post cover

Hitachi a Leader in Privileged Access

Ovum, the global IT research and analyst organisation, has rated Hitachi ID Systems as a leader in the privileged access management market in their recent in-depth report, “Decision Matrix: Selecting a Privileged Identity Management Solution, 2016-2016”. Hitachi’s Privileged Access Manager (PAM) offering is recognised as providing unlimited scalability in comparison to other similar products.  Gideo […]

post cover

Ping Identity Delivers PingAccess for Legacy Web Access Management

A leader in Identity Defined Security (IDS), Ping Identity, has announced that their solution to transition from legacy web access management (WAM), PingAccess, is gaining momentum as more customers adopt the technology.  PingAccess connects users, partners and applications across web, mobile and API architectures. PingAccess has been developed to meet the challenges of transitioning legacy […]

Subscribe to our mailing list

* indicates required Email Address * First Name * Last Name *