Despite the slowdown, demand for UTM appliances is on the rise. It is mainly due to the increasing security consciousness among SMBs, compliance based buying from large enterprises, and vendors’ strategy to reinvent their products by adding more features.http://www.crn.in/crn/features/295073/boom-utm
With additional features not often bundled in your usual UTM and with advanced hardware engineering, the FortiGate 620B represents a new generation of UTM deviceshttp://www.crn.in/crn/products/295365/generation-utm
The company is phasing out its unified threat management appliances for a new platform based on Cyberoam technology to capture a larger share of the midmarkethttp://www.crn.in/crn/news/296621/sophos-phasing-utm-appliances
The solution has a library of more than 200 predefined, multi-country rules to proactively protect personal, financial and healthcare datahttp://www.crn.in/crn/news/291989/watchguard-introduces-dlp-utm
Instead of selling MNC brands in big cities Manohar Malani, MD, NCS Computech, has made it by championing the cause of Indian brands in unfashionable placeshttp://www.crn.in/crn/role_model/294629/power-contrarian-thinking
Cyberoam CR10iNG features the company’s flagship Layer 8 security, is centrally manageable via Cyberoam central console and Cyberoam’s on-Cloud management servicehttp://www.crn.in/crn/news/298481/cyberoam-launches-utm-soho-robo
According to a survey, 71 percent of global hotels, restaurants and other hospitality organizations do not provide unique temporary user passwords for guest Wi-Fi networkshttp://www.crn.in/crn/news/299024/watchguard-announces-ngfw-utm-hospitality
From Sony's gorgeous speaker lamps, to Toshiba's budget tablet with premium features, to a gadget that lets you remotely antagonize your cat with a laser pointer, here are 25 hot products from CES 2015...
Will the Internet of Things usher in a new wave of security attacks? As countries move towards their smart nation master plans, what role will Big Data play? What’s next in the mobile security space?
Cyber security created headlines and headaches in 2014 with large-scale data breaches at retail chains, attacks on data stored in the cloud and massive vulnerabilities revealed in decades-old code. ...