The Simeio platform and services provide the following set of enterprise-grade security and identity capabilities: Access Management and Federation, Access Request, Directory Services, Identity Governance and Administration, Identity Management and Administration, Privileged Access Management, Security & Risk Intelligence, Data Security & Loss Prevention, and Cloud Security.

Simeio Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program

Simeio, a global leader in Identity and Access Management (IAM), and 2020 'ASTORS' Homeland Security Award Winner, has a reputation for delivery of successful IAM solutions, which include Identity Administration, Access...
When Every Second Counts— Learn Why Rapidly Deploying an Agile Network is Mission-Critical in Public Safety Communications

Rajant Corp Returns to Compete in 2021 ‘ASTORS’ Awards Program

First responders, emergency response teams, and other public safety personnel have many critical needs to worry about: reliable communications should not be one of them. Unfortunately, they are often dealing with an...
New research from ThycoticCentrify reveals workers' attitudes to cybersecurity and risks they take to get the job done

Workers Are Taking Cybersecurity Shortcuts, Despite Knowing Dangers

According to new research by ThycoticCentrify, a Platinum Award Winner in the 2019, 2018 and 2016 ‘ASTORS’ Homeland Security Awards Programs, workers are engaging in risky behaviors which could put their company's...
Learn how Hypori unleashes the power of secure mobility wherever your mission takes you from any endpoint device. With Hypori, you empower your users to perform classified work from any endpoint device without worrying about security, with zero footprint and guaranteed 100% separation.

Hypori Virtual Mobility Nominated in 2021 ‘ASTORS’ Awards Program

Hypori is a ground-breaking Enterprise Virtual Mobility solution designed for Government secure teleworkers in Homeland and Defense that lets Work From Home (WFH) users perform business tasks on their mobile devices...

S&T AI/ML Strategic Plan Nominated in 2021 ‘ASTORS’ Awards Program

Artificial intelligence and machine learning (AI/ML) is transformational technology that is affecting every segment of society and the economy. "As the science and technology advisor to the Department of Homeland Security (DHS),...
Tony Cole is a former army cyber operator with more than 35 years’ experience in cybersecurity and today is the Chief Technology Officer at Attivo Networks responsible for strategy and vision.

Attivo Executive’s Experience Helps to Shape Modern Network Protection

Guest OpEd by Tony Cole, Chief Technology Officer, Attivo Networks With attackers increasingly targeting government agencies and contractors, a background in homeland security is a handy thing to have—and my homeland security...
To maximize visibility and secure your organizational ecosystem, it’s critical for IT teams to define an asset management strategy.

Three Preventative Strategies to Help Mitigate Asset Risk in Your Agency

Guest OpEd by Brandon Shopp, Group Vice President, Products, SolarWinds For many federal employees, the workplace has shifted from a traditional office setting to being at home—in a kitchen, bedroom, basement, or...
imageRUNNER ADVANCE DX C3800 Series

Canon Adds Compact A3 Color Models to Line-up of Office MFPs

Helping to meet the needs of the changing workplace, Canon U.S.A., a leader in digital imaging solutions, and Double Award Winner in the 2020 'ASTORS' Awards Program, is pleased to introduce...
Smartphones today are with us everywhere… including the workplace and classified meetings. And therein lies the problem explains Chris Risley, CEO at Bastille Networks. Cell phones infected with spyware show no signs of compromise, giving attackers complete access to email, even encrypted email and messages, plain text messages, photographs, videos, recordings, locations, and notes stored on the phone.

I Spy With My Little… Phone? Yes, It Can Happen to You.

Guest OpEd by Chris Risley, CEO at Bastille Networks The recent revelations surrounding the Pegasus Spyware and its ability to compromise mobile phones should have all government agencies and commercial enterprises on...

Can Your SOC Secure Kubernetes? Using Vuln Scanners, SIEM and EDR for Container Security

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Kubernetes is an inseparable part of modern DevOps infrastructure. While it is extremely powerful and flexible, it also raises major...