Category: TechTime

Ping Identity Launches New Cloud Deployment Offerings to Fast Track Migration to Modern IAM

Ping Identity Launches New Cloud Deployment Offerings to Fast Track Migration to Modern IAM

Latest Product Release Includes Automated Deployment in Amazon Web Services, Faster Migration from Legacy Web Access Management, and Offline Multi-Factor Authentication Capabilities Ping Identity has announced new capabilities in its Ping Identity Platform to help global enterprises streamline the migration to modern IAM in today’s hybrid IT environment. Enterprises today require more flexible deployment options, […]

NetFoundry Announces AWS Marketplace Listing of its NetFoundry Platform and Demonstrates Securely Connected Car IoT Solution at re:Invent

NetFoundry Announces AWS Marketplace Listing of its NetFoundry Platform and Demonstrates Securely Connected Car IoT Solution at re:Invent

Secure, high performance, software-only connectivity to AWS from any internet connection News Summary: NetFoundry Platform enters the AWS Marketplace NetFoundry and Micron show how connected vehicles can be instantly securely connected to AWS and AWS IoT based services at Micron Booth 2822 at AWS re:Invent in Las Vegas NetFoundry, a Tata Communications business incubated in […]

Trend Micro Acquires Immunio and Expands Hybrid Cloud Security for DevOps Lifecycle

Trend Micro Acquires Immunio and Expands Hybrid Cloud Security for DevOps Lifecycle

Acquisition and in-house development further reduce security roadblocks As companies build and deploy applications faster across everything from cloud to containers, any drag on the DevOps lifecycle can create drag on an entire business. In response to this, Trend Micro has announced the expansion of its Hybrid Cloud Security solution scope. New capabilities, attained through a […]

McAfee to Acquire Skyhigh Networks, Creating a Global Leader in Endpoint and Cloud Cybersecurity

McAfee to Acquire Skyhigh Networks, Creating a Global Leader in Endpoint and Cloud Cybersecurity

McAfee and Skyhigh Networks Announce a Definitive Agreement to Combine Businesses Highlights: McAfee, less than eight months since its spinout as a standalone company, makes this move to accelerate innovation and growth as a company singularly focused on being the preferred cybersecurity partner for customers. This agreement is evidence of McAfee’s ability to acquire leading […]

Hitachi Develops Open Source Software Based Big Data Analytics Technology to Increase Speed by Up to 100 Times

Hitachi Develops Open Source Software Based Big Data Analytics Technology to Increase Speed by Up to 100 Times

For a high-speed analytics system with lower IT investment Hitachi has announced the development of the technology increasing the speed of big data analytics on an open source software Hadoop-based distributed data processing platform(1) (Hadoop platform) by a maximum of 100 times that of a conventional system. This technology converts data processing procedure generated for […]

Global Gaming Expo Asia 2018 Gets Set for Industry Heavyweights

Global Gaming Expo Asia 2018 Gets Set for Industry Heavyweights

Global Gaming Expo (G2E) Asia, the region’s one-stop destination for forward-thinking gaming and entertainment decision makers and suppliers, will be returning to Macau, the heart of Asian gaming, from May 15 -17, 2018 at The Venetian Macao. Presented by the American Gaming Association (AGA) and organized by Reed Exhibitions, the three-day exhibition will showcase the […]

NEC’s advanced recognition systems lead a new frontier of security

NEC’s advanced recognition systems lead a new frontier of security

NEC Australia has announced a new whitepaper that explains how advanced recognition systems can deliver a safer and more secure future for Australia and the Asia Pacific. Advanced recognition systems are set to play an increasingly important role as governments and enterprises respond to three major technological forces that are redefining the rules of business, […]

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Transition Plans for Key Establishment Schemes using Public Key Cryptography

Summary: NIST guidelines on approved public key key-establishments schemes are specified in the NIST SP 800-56 series of publications. While legacy key establishment schemes have been programmatically allowed for use by agencies in FIPS 140-validated modules, NIST SP 800-131A Rev. 1, Transitioning the Use of Cryptographic Algorithms and Key Lengths, specifies that only schemes specified […]

Check Point joins forces with LG to secure their smart home devices

Check Point joins forces with LG to secure their smart home devices

Check Point helps block a major security vulnerability in LG SmartThinQ home IoT appliances Check Point Software Technologies has announced that its security researchers have discovered HomeHack – a vulnerability that exposed millions of users of LG SmartThinQ smart home devices to the risk of unauthorised remote control of their SmartThinkQ home appliances. The vulnerabilities […]

Schneider Electric introduces security management solution that protects people and maximizes productivity

Schneider Electric introduces security management solution that protects people and maximizes productivity

EcoStruxure Security Expert helps users meet the unique safety challenges of their building environment Integrated solution enables clearer decisions, faster responses and maximum facility efficiency Schneider Electric has introduced EcoStruxure Security Expert, a new integrated security management solution that provides high performance access control and intrusion detection functionality to ensure the most secure building environment possible. […]