Our Blog

Home / Blog

Securing the Workforce of the Future – Forcepoint

Securing the Workforce of the Future – Forcepoint

Forcepoint recently worked with Fujitsu in an online summit discussing the hot topic of how to embrace hybrid working as we return in part to in-person working. It now looks like full-time, office-based working is going to be the exception rather than the norm, and so...

Why India has Introduced the New Personal Data Protection Bill

Why India has Introduced the New Personal Data Protection Bill

Since the EU GDPR came into force in 2018 many countries around the world have followed suit and have either revamped or introduced new data protection and privacy regulation. India, too, is taking steps to enact a data protection framework that incorporates many...

How to Control USBs and Removable Devices with Endpoint Protector

How to Control USBs and Removable Devices with Endpoint Protector

Removable devices have become commonplace tools in today’s work environment. They include everything from optical disks and memory cards to smartphones, USB flash drives, and external hard drives. An advantage of removable devices is that employees can easily take...

An Integrated Platform Approach to Cloud Security

An Integrated Platform Approach to Cloud Security

Organizations need to implement an integrated platform approach to address the various issues that highly distributed cloud environments may introduce.  As more and more enterprises embrace multi-cloud, they need solutions that can connect and secure these complex...

How Apple plans to monitor users

How Apple plans to monitor users

Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices. In early August 2021, Apple unveiled its new system for identifying photos containing images of child abuse. Although Apple’s motives —...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo