Advanced Threat Landscape Report 2018 by CyberArk

CyberArk survey shows organizations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments. According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber-attack. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure and assets at risk. Security starts with protecting privileged accounts An overwhelming number of IT security professionals believe securing an environment starts…

Read More

Hikvision participates at Retail Leadership Summit 2018

Hikvision has participated in the 11th edition of Retailers Association of India’s (RAI) recently held Retail Leadership Summit (RLS), Mumbai to showcase its latest products and solutions in the video surveillance and security domains for the retail sector. The Retail Leadership Summit (RLS) was flagged off with an inspiring opening speech by B.S. Nagesh, Chairman, RAI and Founder, TRRAIN. The Summit revolved around the central theme ‘Customer Centricity- Redefining Values and Valuations. “Retail Leadership Summit (RLS) is a great platform for networking among existing and potential retailers, developers, logistics and…

Read More

Safeguards for Securing Virtualized Servers By NIST

This bulletin outlines the security recommendations that NIST recently provided in Special Publication (SP) 800-125A – security recommendations for Hypervisor Deployment on Servers. The document provides technical guidelines about the secure execution of baseline functions of the hypervisor, regardless of the hypervisor architecture. In the past, a user wishing to set up a computing server generally needed to use a dedicated host with dedicated resources such as a central processing unit (CPU), memory, network and storage. Modern systems have technology that lets one create virtual machines to emulate what used…

Read More

Global Access Management Market By IHS Markit

Access management can be defined as the process of granting authorized users the rights to use a service, while preventing access to non-authorized users. Following are the key access management growth factors over the next five years. GDPR deadline fast approaching Traditionally, finance, banking, insurance, government, utilities and other heavily regulated end-user sectors have focused on identity- and accessmanagement solutions. However, over the past year there has been growth in non-traditional markets. Not only have the manufacturing and retail sectors become more security conscious, but the increase in the number…

Read More