• Solutions Review
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • ERP
    • Enterprise Cloud Strategy
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • About Us
  • Team
  • Contact
  • Do Not Sell My Personal Info

Solutions Review Technology News and Vendor Reviews

Link to Backup & Disaster Recovery Buyer's Guide

Menu

  • Backup & Recovery
    • Data Storage
  • Enterprise Cloud
  • Cybersecurity
    • Endpoint Security
    • Identity Management
    • SIEM
  • Data & Analytics
    • Business Intelligence
    • Data Integration
    • Data Management
  • Work Tech
    • ERP
    • Talent Management
    • BPM
    • Marketing Automation
    • CRM
    • Content Management
  • Networks
    • Mobility
    • Network Monitoring
    • Wireless

Endpoint Security

cybersecurityventures.jpg

Top 10 Endpoint Security Providers in the Cybersecurity 500 List for Q2 2016

Cybersecurity research and market intelligence firm Cybersecurity Ventures has released the latest iteration of its Cybersecurity 500 list, a global …

July 28, 2016Endpoint Security Read more
Carbon-black.png

Carbon Black Acquires Confer, a “Next Gen” Anti-Virus Platform

Waltham, MA-based endpoint security firm Carbon Black has announced its acquisition of Confer, a Southborough, MA-based next-generation antivirus (NGAV) …

July 21, 2016Endpoint Security Read more
avast-2016.jpg

Avast Set to Acquire AVG for $1.3BN USD

Avast Software is set to acquire rival anti-virus solution provider AVG Technologies for $1.3 billion, according to a press release put out by Avast …

July 8, 2016Endpoint Security Read more

Six Ransomware Survival Guides

These days it seems like you can’t watch the evening news without hearing another ransomware horror story. The  epidemic of weaponized encryption has hit a …

June 30, 2016Endpoint Security Read more
kim-jung-un.jpg

North Korea Hacks 140,000 Seoul Computers, Steals Defense Plans

In popular culture, North Korea isn’t exactly known for technological prowess. The hermit kingdom and last bastion of true Stalinism is …

June 14, 2016Endpoint Security Read more
Newer posts →

Featured Video

Subscribe to Solutions Review Youtube Channel
Udacity Ad

Follow Us

  • LinkedIn
  • Twitter
  • Facebook
  • YouTube
  • Application Development
  • Backup and Disaster Recovery
  • BI and Data Analytics
  • Business Process Management (BPM)
  • Content Management
  • CRM
  • Data Integration
  • Data Management
  • Data Storage
  • Endpoint Security
  • Enterprise Resource Planning (ERP)
  • Identity and Access Management
  • Marketing Automation
  • Mobile Device Management
  • Network Monitoring
  • Security Information & Event Management (SIEM)
  • Talent Management & HR
  • Wireless Networks Solutions
© 2012-2023 Solutions Review. All rights reserved.
Privacy Policy | Do Not Sell My Info
Top