Please turn on your JavaScript for this page to function normally.
zero trust
Zero trust security solutions widely adopted, spurred by surge in ransomware

Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the …

Ericom Software launches ZTEdge, a zero trust security platform for MSEs and small businesses

Ericom Software announced the launch of ZTEdge, a comprehensive zero trust security platform that meets the unique requirements of midsize enterprises (MSEs) and small …

Ericom Software appoints Dr. Chase Cunningham as Chief Strategy Officer

Ericom Software announced that Dr. Chase Cunningham has joined the company as its Chief Strategy Officer. In this role, he will shape the company’s strategic vision, …

network
New infosec products of the week: August 14, 2020

Ericom Application Isolator separates corporate apps from unauthorized users to prevent ransomware Ericom Software announced the introduction of Ericom Application Isolator, a …

Ericom Application Isolator separates corporate apps from unauthorized users to prevent ransomware

Ericom Software announced the introduction of Ericom Application Isolator, a new solution that integrates with existing remote access VPNs and Next Generation Firewalls to …

Ericom Connect 9.3: Secure access for remote and work-from-home users

Ericom Software, a leader in secure web and application access solutions, announced the release of Ericom Connect 9.3, the latest version of its browser-based secure remote …

Check Point and Ericom Software join forces to tackle browser-based attacks

Ericom Software unveiled the integration of Ericom Shield Remote Browser Isolation (RBI) solution with Check Point Software Technologies Advanced Network Threat Prevention. …

Ericom’s managed access solution accelerates cloud transition for enterprises and service providers

Ericom Software released Ericom Connect 9.0. This latest release of the company’s remote application and desktop access solution extends its capabilities and further …

cryptocurrency
Cryptojacking is the new malware

The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which these currencies are earned. At its core, mining …

laptop
Secure remote browsing: A different approach to thwart ever-changing threats

A defense-in-depth strategy is essential to modern enterprises, and organizations must deepen their defenses as quickly as possible to fully protect themselves. One promising …

Don't miss

Cybersecurity news