Security

Recent Articles

  • ForeScout Brings Agentless Security to the Channel

    Looking to make it simpler for partners to resell agentless security software and employ it to deliver managed services, network security specialist ForeScout Technologies forged distribution agreements with Arrow Electronics and Westcon. Previously, ForeScout sold its software via only direct relationships with a limited number of channel partners. With the increasing popularity of bring-your-own-device (BYOD)…

  • Privileged Account Takeovers Pose Major Risks

    Cyber security Privileged Account Takeovers Pose Major Risks Here’s a look at areas of high risk, such as privileged account takeovers, with which enterprises need help to improve their security. Account Takeovers 61% of respondents cited privileged account takeover as the most difficult stage of an attack to mitigate, up from 44% last year. Mitigation…

  • Arbor Enlists Partners to Help Fight DDoS Attacks

    Moving to provide channel partners with access to a portfolio of technologies and services for preventing distributed denial-of-service (DDoS) attacks, Arbor Networks, a unit of Netscout, revamped its product lineup. In addition, Arbor Networks is now working with Cisco to making it simpler to embed its DDoS protection software directly within a Cisco ASR 9000…

  • EMV Chip-Card Deadline Creates Channel Mandate

    Your customers who accept credit cards as payment need to be EMV-compliant, and the closer they get to achieving compliance by the Oct. 1, 2015, deadline, the better. Many companies will not meet the deadline for new fraud-liability rules and will have to scramble to address the new requirements. EMV is the new Europay-MasterCard-Visa protocol…

  • How Cloud, IoT Are Altering the Security Landscape

    Security threats How Cloud, IoT Are Altering the Security Landscape Cyber-threats continue to evolve as businesses adopt public clouds and IoT devices. Here’s why businesses should pay more attention to security. Ransomware on the Rise New ransomware samples increased 58% in Q2 from Q1 due to fast-growing new families, including CTB-Locker and CryptoWall. The total…

  • In Search of a Context-Aware Security Strategy

    Context-aware security In Search of a Context-Aware Security Strategy Seeking to strike a balance between security and end-user productivity, many firms are looking for some form of context-aware security, which prioritizes threats. IT Security Priorities IT pros (87%) and business execs (86%) agree that IT security is a much higher priority than end-user convenience. IT…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.