Security News
IBM, the leader in multicloud management and Turbonomic, the leader in Application Resource Management, announced a partnership that brings the power of continuous application performance to IBM's multicloud management solutions. IBM clients can leverage MCM with Turbonomic's AI-driven automation to manage the entire stack of resources that deliver today's applications.
Revolutionary Security's portfolio of cybersecurity services includes assessment and testing, design and build of security programs and functions as well as security operations across its clients' IT and OT systems. Revolutionary Security leverages proprietary technology and methods to help mature the security capabilities of its clients and manage risk.
What are the most unexpected pitfalls for a CISO that wants to strengthen an enterprise third-party risk management program? Before third-party risk management can become a competitive advantage, businesses need to perfect the block-and-tackle basics of third-party risk management.
Lenovo Data Center Group expands its portfolio of IT infrastructure solutions. "At a time when the speed and agility of processes critically impacts your daily business operations, our customers demand more powerful, secure and flexible solutions," said Kamran Amini, Vice President and General Manager of Server, Storage and Software Defined Infrastructure at Lenovo DCG. "Lenovo's technology architecture is purpose-built to deliver real-time, valuable insights from edge to core to cloud, enabling a new era of intelligence where customers can fully realize the potential of the data at their disposal."
Spectra Logic, a leader in data storage and data management solutions, announced that StorCycle, its new Storage Lifecycle Management software, now supports Linux in addition to Windows operating systems, providing effortless data management for midsize and large enterprises. "Organizations must brace for this new paradigm and optimize their infrastructures to remain competitive. StorCycle alleviates the strain placed on the Primary Tier of storage by finding less active data and moving it to a Perpetual Tier where it is accessible and protected for the long term. This can help organizations accelerate IT efficiencies right away."
Let's look at and debunk the top vulnerability management myths, so that enterprises may opt to change their practices in ways that make fortifying cyber defenses and reducing risks significantly easier. New vulnerability management solutions make scanning at scale significantly faster and easier without impacting network performance, so there is really no good reason why enterprises should put networks at risk unnecessarily.
HCL Technologies, a leading global technology company, announced BigFix 10, a major new release of the industry's leading endpoint management platform, to be generally available in April 2020. BigFix 10 is the only endpoint management platform that enables IT/Security Operations to fully automate discovery, management and remediation, whether it's on-prem or cloud, regardless of location or connectivity.
Censinet, the leading collaborative risk network for healthcare organizations, announced new products and capabilities across three strategic areas - Continuous Monitoring, Controls Validation, and Vendor Lifecycle Workflows. "Healthcare organizations demand faster, higher-quality and more complete risk assessments across their supply chain. It drives our vision of 'taking the risk out of healthcare' and delivering unique capabilities such as One-Click Assessments™," said Ed Gaudet, CEO and founder of Censinet.
SecZetta, the leading provider of third-party identity management solutions, and Focal Point, a leading cybersecurity services provider, announced a new solution integrator partnership. Together, SecZetta and Focal Point provide clients with a 360° view of third-party identity and lifecycle management, placed into the context of their broader IAM and risk management practices.
In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started with a proven process that works. Our flagship product is a vendor risk management product that really focuses on third-party risk and vendor management.