Search Results
1,605 results
Your search is now limited to «Network Security» expert search.
Business Wire 01/22/2019 08:00
Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network.
More from Business Wire:
PR Newswire 01/22/2019 07:33
Certifying authenticity at the point of sale using blockchain technology, customers can scan the code and ascertain the authenticity of the product.
More from PR Newswire:
Many recent ransomware attacks have targeted endpoint devices, either aiming at holding the device’s data to ransom, or to gain access to the larger network.
More from IT News Africa (South Africa):
Security Bloggers Network 01/22/2019 07:00
Most security professionals say network security is harder this year when compared to last year – according to a survey we recently conducted.
More from Security Bloggers Network:
CSO Magazine 01/22/2019 06:00
Users will see a GreatHorn icon on their email client, but no agents or programs are installed on endpoints.
More from CSO Magazine:
Global Security 01/22/2019 04:07
This almost limitless scalability enables organizations to support 5G networks’ high data rates and ultra-low latency, and secure the largest, most resource-hungry environments, setting new standards in hyperscale network security.
More from Global Security:
Biometric Privacy Platform (BPP) consists of authentication hardware and software for the Aadhaar ecosystem, preserving convenience while increasing personal privacy and data security and putting the resident in charge of the use of their Aadhaar data including picture, name, address, mobile number ...
More from Paypers Insights into Payments:
Electronics Maker 01/22/2019 02:51
Matrix will be launching several solutions for SMB at the event Enterprise Video Collaboration solution, SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities.
More from Electronics Maker:
Deccan Chronicle - India 01/22/2019 01:04
Under the partnership agreement, Identity Devices will include fingerprint and iris biometric technology from Fingerprints in new products and pre-certified integration kits that make it easy for device makers to add frictionless multi-modal biometric experiences and enable local authentication and access to global and national authentication ecosystems ...
More from Deccan Chronicle - India:
findBIOMETRICS 01/21/2019 18:48
A forthcoming cryptocurrency wallet will feature biometric security care of Fingerprints (FPC.
More from findBIOMETRICS:
BiometricUpdate 01/21/2019 14:16
The filing for “Detecting replay attacks in voice-based authentication” describes a system in which a “watermark signal” is included by the device in the captured audio of a voice authentication factor spoken by the user.
More from BiometricUpdate:
Security Intelligence 01/21/2019 08:15
Authentication factors that are not visible, such as device fingerprinting, geolocation, IP reputation, device reputation and mobile network operator (MNO) data, can contribute substantially to identity verification.
More from Security Intelligence:
GBHackers On Security 01/21/2019 03:48
The vulnerability can be tracked as CVE-2018-15439, and exists with Cisco Small Business Switch SOHO that used to manage the small local area networks.
More from GBHackers On Security:
The Payers 01/21/2019 02:31
When data must be shared with a TPP, the bank is in the best position to deliver a seamless authentication experience that does not compromise security.
More from The Payers:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications