Seagate

Seagate Strengthens Federal Cyber Security with Fornetix Encryption

Seagate Technology's portfolio hard drives and solid-state drives designed to meet stringent federal security standards, now integrate with advanced encryption key management software and services from Fornetix. The integration gives federal government...
Quantum StorNext

StorNext Named Network Computing Product of the Year Finalist

Network Computing readers have nominated Quantum Corporation's StorNext 5 scale-out file system and multi-tier data management software as a finalist in the Storage Product of the Year category for the 2017...
SitaWare Frontline Military Software (Image Credit: Systematic Inc.)

US Army Mission Command Selects SitaWare for C4I (Learn More – Video)

U.S. Army Mission Command has awarded a multi-million dollar contract to Systematic Inc., a new supplier of IT solutions to the US military for its Commercial Off-The-Shelf (COTS) C4I product, SitaWare. With the...

GD to Provide IT/Cyber Security for US Navy Installations (Learn More-Video)

General Dynamics Information Technology, has been awarded the Commander Navy Installations Command (CNIC) N6 Information Technology Support contract to continue delivering enterprise-level IT services to SPAWAR Systems Center Atlantic and CNIC. The single...
(ISC)² CEO David Shearer

7th Annual (ISC)² Security Congress, Stand Alone Event Sept 25-27

(ISC)²® today announced their annual Security Congress will be a stand-alone event without former partner ASIS International. It will take place September 25-27 at the JW Marriott in Austin, TX. (ISC)² Security...
NICE Investigate Solution

NICE Investigate Earns CJIS ACE Compliance Seal (How it Works)

NICE, Winner of the 2016 ‘ASTORS’ Homeland Security Platinum Award for Best Investigation System, has earned the CJIS ACE Compliance Seal from Diverse Computing for its NICE Investigate solution. The CJIS ACE Compliance Seal is awarded...

Sophos New Phish Threat Attack Simulator with Analytics & Training

Sophos, has launched Sophos Phish Threat, an advanced phishing attack simulator and training solution that is fully integrated with the company’s cloud-based security management platform, Sophos Central. With centralized management and automated campaign...
Aegis Secure Key 3z

Aegis Secure Key 3z Encrypted Flash Drive & Aegis Configurator Released

Apricorn, a 2016 'ASTORS' Homeland Security Awards Platinum Winner for Best Data Storage Security Device, and the leading manufacturer of software-free, hardware-encrypted USB drives, has released the new Aegis Secure Key 3z hardware...
Washington County, Arkansas

Gov’t Agency Selects Netwrix for IT Mgmt & Compliance (See in Action)

Netwrix, the first vendor to introduce a visibility and governance platform for hybrid cloud security, and a 2016 'ASTORS' Homeland Security Awards Program Platinum Award Winner for Best Cyber Auditing & Compliance...
National Cyber Security Alliance

Data Privacy Day: Protecting Privacy is Critical to Business (Learn More)

In an increasingly connected world of ever-evolving cyber threats, consumers are paying more attention to their privacy and the security of their data. 74 percent of consumers indicated that it was “important”...
Facebook Auto Publish Powered By : XYZScripts.com