Digital security firm Gemalto has today announced the final closing of the acquisition of data and software protection firm SafeNet, following approval by the relevant regulatory and antitrust authorities.
Gemalto plans to acquire SafeNet for $890 million in a deal that would combine a big vendor of portable secure elements such as payment cards with a provider of enterprise data protection technology. […]
Security concerns are preventing businesses from unlocking the potential benefits of data centre consolidation and cloud services, according to new research from SafeNet.
Safenet claims to have invented the world’s first Crypto Hypervisor, and it will unveil the technology at next week’s GITEX trade show as part of its “secure breach” strategy.
1. What are your company’s key products and services? SafeNet is the largest company in the world exclusively focused on the security and protection of high value information, intellectual property and digital identity. […]
SafeNet has acquired Cryptocard, a privately held leader of cloud based authentication solutions, in a move to broaden its authentication and cloud services. The acquisition, of which the fee was not disclosed, enhances […]
The report reveals a widening gap emerging between the perception and the reality of perimeter security effectiveness among global IT decision makers.
Debating political issues, promoting free speech, and supporting human rights, the illegal cyber activities of hacktivists divide opinion. Are they criminals like any other, or are their cases of their work justifying their underhand means?
With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.
Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.
In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.
The European Parliament has cut access to its public Wi-Fi network after detecting a man-in-the-middle attack on a number of email accounts apparently carried out by a white hat researcher out to expose poor security at the institution.
As hackers and attackers wreak havoc on the industry, businesses have been looking for a watchful protector to secure their assets. Is security-as-a-service the IT industry’s Dark Knight?
While certain recent announcements weren’t as “startling” as Oracle CEO Larry Ellison had promised they would be, its deal with Salesforce.com definitely lived up to the hype and could have some lasting ramifications.
The last year has shown more than ever how careful businesses need to be with their data. However, recent reports suggest that only a fraction of Middle Eastern enterprises have data loss prevention […]
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to allow phreaks to make free calls – wire fraud was born. This was […]
There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME rounds up tips from the security industry on how to cope with the […]
Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security will be the main disruptive technology for 2013. But the Middle East has […]
Security shot up the priority list of not just CIOs but also higher management in 2012 as the world witnessed the effects of countless breaches on top organisations. As a fresh year presents […]
The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun to redefine the industry entirely. One of the key trends was the virtualisation […]
In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, or authenticate, should be a simple and straightforward action – but surprisingly, it’s […]
The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud and hybrid implementations in the Middle East are picking up, views towards the […]
With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben Rossi looks at how these trends have rapidly changed the enterprise security landscape […]
In response to dramatic and widely publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the […]
IT Security Training & Solutions – I(TS)2, the Middle East’s premier provider of integrated Security Education & Certification Curriculum, Security Solutions, Security Consultancy and Managed Security Services, today announced that it has been […]
The current climate of company mergers and downsizing is putting CIOs under pressure to keep the lid on software costs which now account for nearly a third of the average IT budget. Add […]
James Dartnell takes the Asus Transformer Book T300 Chi for a spin, and reveals why although it may have its critics, it ultimately delivers as a stylish travel product.
Lenovo recently released the super-svelte LaVie Z laptop, offering Windows fans a clamshell that’s just as lightweight as Apple’s new 12-inch MacBook.
Sometimes, less is truly more. When it comes to the Linksys WRT1200AC, the little brother to the WRT1900AC router introduced last year, it might be best to say less is just enough.