• Solutions Review
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • ERP
    • Enterprise Cloud Strategy
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • About Us
  • Team
  • Contact
  • Do Not Sell My Personal Info

Solutions Review Technology News and Vendor Reviews

Link to Backup & Disaster Recovery Buyer's Guide

Menu

  • Backup & Recovery
    • Data Storage
  • Enterprise Cloud
  • Cybersecurity
    • Endpoint Security
    • Identity Management
    • SIEM
  • Data & Analytics
    • Business Intelligence
    • Data Integration
    • Data Management
  • Work Tech
    • ERP
    • Talent Management
    • BPM
    • Marketing Automation
    • CRM
    • Content Management
  • Networks
    • Mobility
    • Network Monitoring
    • Wireless

Endpoint Security

uncle-sam.jpg

I Want You! … To Hack The US Army

Pentagon Launches Ambitions Bug Bounty Program.  The US Army Wants You!… To hack their networks, that is. Last week, outgoing Secretary of the Army …

November 15, 2016Endpoint Security Read more
NSA-HQ-Day.jpg

ShadowBrokers Release More Data, Hint at Exploits Stolen From NSA

The anonymous hacking group known as ShadowBrokers has once again publically posted data that it claims to have obtained by hacking a notorious NSA-linked …

November 2, 2016Endpoint Security, Mobile Device Management Read more
CounterTack-vid.png

CounterTack Announces $10M Round of Funding, Plans to Accelerate APAC Growth

Endpoint detection and response (EDR) solutions provider CounterTack has announced a $10 million round of funding from a portfolio of strategic investors. …

November 1, 2016Endpoint Security Read more
forrester-wave-endpoint-q4-2016.png

Key Takeaways: Forrester’s 2016 Endpoint Security Suites Wave Report

Cambridge-Ma based analyst house Forrester Research has released the latest iteration of its flagship Wave report for Endpoint Security Suites. In their …

October 26, 2016Endpoint Security Read more
down-detector-level-3-3-23-pm.png

Massive Mirai DDoS Attack ‘Breaks The Internet’

The internet broke on Friday. Or at least, a large, very popular portion of it did. Hundreds of popular sites including Twitter, Netflix, and CNN have faced …

October 24, 2016Endpoint Security Read more
Carbon-black.png

Shhhh! Carbon Black Secretly Files for IPO

Waltham, MA-based Endpoint Security firm Carbon Black quietly filed for its initial public offering Friday, according to reporting from the Wall Street …

October 4, 2016Endpoint Security Read more
yahoo-data-breach.png

500 Million Yahoo Accounts Hacked: Here’s What We Know

Yahoo Inc. has confirmed rumors of  a massive security breach affecting at least 500 million Yahoo Mail users in what is possibly the largest data breach in …

September 23, 2016Endpoint Security Read more
NSA-HQ-Day.jpg

The ‘ShadowBrokers’ NSA Hack: What you Need to Know

The NSA has been hacked— or at least that’s what an anonymous hacker group is claiming. The news made headlines this week, but not without sparking massive …

August 25, 2016Endpoint Security, Endpoint Security News, Featured Read more
gartner-mountains.jpg

Gartner Report Outlines Increased InfoSec Spending, With a Focus on Detection and Response

Worldwide spending on information security products and services will reach $81.6 billion in 2016, according to new reports from Gartner, Inc., an increase of …

August 15, 2016Endpoint Security, Endpoint Security News Read more
palo-alto-networks.png

Palo Alto Networks Adds Machine Learning to Traps Endpoint Protection

Palo Alto Networks is adding new machine learning capabilities to its Traps advanced endpoint protection solution, according to an announcement made …

August 4, 2016Endpoint Security Read more
← Older posts

Featured Video

Subscribe to Solutions Review Youtube Channel
Udacity Ad

Follow Us

  • LinkedIn
  • Twitter
  • Facebook
  • YouTube
  • Application Development
  • Backup and Disaster Recovery
  • BI and Data Analytics
  • Business Process Management (BPM)
  • Content Management
  • CRM
  • Data Integration
  • Data Management
  • Data Storage
  • Endpoint Security
  • Enterprise Resource Planning (ERP)
  • Identity and Access Management
  • Marketing Automation
  • Mobile Device Management
  • Network Monitoring
  • Security Information & Event Management (SIEM)
  • Talent Management & HR
  • Wireless Networks Solutions
© 2012-2023 Solutions Review. All rights reserved.
Privacy Policy | Do Not Sell My Info
Top