Skip to content

Posts Tagged ‘data security’

StarLink chosen to expand Centrify’s network across Africa & Middle East

Centrify, the leader in securing hybrid enterprises through the power of identity services, has revealed that it has appointed StarLink as its value-added distributor (VAD) for the Middle East. According to the terms of the agreement, StarLink will promote and distribute Centrify Identity Services through its extensive network of channel partners and solution providers across…

Read More

StarLink chosen to expand Centrify’s network across Africa & Middle East

Centrify, the leader in securing hybrid enterprises through the power of identity services, has revealed that it has appointed StarLink as its value-added distributor (VAD) for the Middle East. According to the terms of the agreement, StarLink will promote and distribute Centrify Identity Services through its extensive network of channel partners and solution providers across…

Read More

Password vaults alone not enough to stop data breaches, warns Centrify

Password vaults alone not enough to stop data breaches, warns Centrify

Password vaults alone not enough to stop data breaches, warns Centrify Centrify, the leader in securing hybrid enterprises through the power of identity services, has announced significant enhancements to its best-in-class privileged identity management (PIM) solution to stop data breaches that abuse privilege, and warns password vaults not enough to stop breaches. Centrify says that…

Read More

Mimecast Email Security Risk Assessment report finds 57 per cent of businesses in Middle East believe they will suffer as a result of cybercriminals in 2017

Mimecast launches Email Security Risk Assessment (ESRA)

Mimecast Email Security Risk Assessment report finds 57 per cent of businesses in Middle East believe they will suffer as a result of cybercriminals in 2017 Leading email and data security company, Mimecast has announced the launch of the Mimecast Email Security Risk Assessment (ESRA), an analysis report measuring the effectiveness of email security systems. This…

Read More