Please turn on your JavaScript for this page to function normally.
Voltron Data Theseus helps organizations solve data processing challenges

Voltron Data introduced Theseus, a distributed execution engine built to solve today’s data processing challenges at a scale beyond the capabilities of CPU-based analytics …

Hitachi Vantara Pentaho+ allows organizations to oversee data from inception to deployment

Hitachi Vantara announced Pentaho+, an integrated platform from the Pentaho software business designed to help organizations connect, enrich, and transform operations with …

Flow Security unveils GenAI DLP module to prevent data leaks in real-time

Flow Security announced its extension to GenAI Security with the launch of a new GenAI DLP module. The widespread use of Generative AI, while leading to advancements across …

Dremio introduces GenAI-powered data documentation and labeling to reduce manual work

Dremio has unveiled AI-powered data discovery capabilities that accelerate and simplify data contextualization and description for analytics, along with improved capabilities …

SDO Introduces cryptographic proximity validation for mobile push

Secret Double Octopus (SDO) has enhanced its Passwordless MFA platform to offer government- caliber identity verification to enterprises who need high-assurance login for …

Delinea Secret Server enhancements increase privileged access management adoption

Delinea announced new features for Secret Server to improve usability and increase PAM adoption across organizations. These enhancements optimize how privileged users interact …

Egress unveils graymail detection capability to improve employee productivity

Egress has launched a highly accurate graymail solution, with full end-user control, dedicated to improving employee productivity and reducing the time administrators spend …

Nitrokey releases NetHSM, a fully open-source hardware security module

German company Nitrokey has released NetHSM 1.0, an open-source hardware security module (HSM). Nitrokey NetHSM 1.0 features The module can be used for storing and managing a …

ThreatNG empowers organizations to identify and mitigate their ransomware risk

ThreatNG Security launched its new Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution. The new solution helps organizations assess their ransomware …

SAS collaborates with AWS to help customers unlock more value from their data

SAS has signed a strategic collaboration agreement (SCA) with AWS with plans to help customers extract maximum value and performance from their data in the cloud. SAS now …

ManageEngine introduces a dual-layered threat detection system in its SIEM solution, Log360

ManageEngine has unveiled the dual-layered threat detection system in its security information and event management (SIEM) solution, Log360. The new feature, available in …

1Kosmos enables identity proofing from the web without downloading a mobile app

1Kosmos announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity proofing sessions to a user’s mobile device for scanning …

Don't miss

Cybersecurity news