Articles about Enterprise

Zoho launches revamped platform to create business mobile apps

Business mobile devices

Business operating system Zoho is launching an updated version of its Creator apps builder, delivering the ability to build native mobile apps to automate business processes.

Zoho Creator 5 introduces a drag-and-drop interface to complement its HTML/CSS screen creator, and includes pre-built design elements like buttons, layouts, and reports that users can drag onto their page.

Continue reading

McAfee brings machine learning to enterprise security

machine learning AI

Cyber security company McAfee is announcing an expanded product portfolio that evolves security operations capabilities and allows for rapid response to today’s threats.

McAfee's updated Enterprise Security Manager (McAfee ESM 11) uses a new data architecture optimized for scalability, performance, faster search, and collaboration. This is combined with the newly launched McAfee Behavioral Analytics, and enhanced McAfee Investigator, McAfee Advanced Threat Defense, and McAfee Active Response.

Continue reading

Almost six out of 10 organizations suffer ransomware attacks

Ransomware sign

New research reveals that 56 percent of surveyed decision makers from IT and risk, fraud or compliance functions report that their organization has suffered a ransomware attack in the last 12 months, compared to under half (48 percent) who said the same in 2016.

The study of 500 businesses in the UK, France, Germany and USA commissioned by SentinelOne and carried out by Vanson Bourne shows 69 percent say the most successful ransomware attack resulted in the attacker being able to encrypt some data, with five percent paying the ransom to decrypt the data.

Continue reading

Unsecured third-party IoT devices could pose major risks for organizations

Internet of things

According to new research, 97 percent believe unsecured IoT devices could be catastrophic for their organization, yet just 29 percent actively monitor for related third-party risks.

The study conducted by the Ponemon Institute and risk assurance body Shared Assessments shows 81 percent of respondents say that a data breach caused by an unsecured IoT device is likely to occur in the next two years.

Continue reading

Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]

Keyboard with GDPR date

With GDPR coming into effect on 25th May, many organizations will find themselves needing to appoint a data protection officer in order to comply.

But appointing full-time compliance staff can be a difficult and costly exercise. Which is why cyber security company ThinkMarble is launching a Virtual Data Protection Officer (VDPO) service.

Continue reading

Lack of investment in security training adds to skills gap

training key

Cyber security is seen as one of the biggest threats to business. Yet employees are not being supported by their organizations when it comes to investing in their continued education and career development.

Crowd sourced IT and security training solution Cybrary, along with cyber security research body the Cyentia Institute, have produced a report looking at the cyber skills gap.

Continue reading

Mainframes become more important to enterprises but staff shortages pose problems

mainframe

The mainframe is becoming more important to large enterprises, with the percentage of organizations running at least half their business-critical applications on these platforms expected to increase next year.

But the loss of skilled mainframe staff, and the failure to subsequently fill these positions, poses significant threats to application quality, velocity and efficiency.

Continue reading

New developer tool aids deployment of AI applications

Developer at work

There's increasing demand for AI and machine learning solutions from businesses, but often a shortage of skills is holding back implementation.

Cloud computing specialist Paperspace is launching a new tool called Gradient to allow developers to tap into a dedicated cloud of AI solutions for building, training and deploying machine learning applications.

Continue reading

Samsung unveils rugged Galaxy Tab Active2 business tablet with LTE

Samsung rugged2

Quality Android tablets are becoming increasingly rare on the consumer market. Why? There are many reasons, such as the adoption of large-screen smartphones. When your phone has a 6-inch screen, a 7- or 8-inch tablet can feel redundant. Not to mention, despite an arguably stronger economy, there are still many consumers that don’t have much disposable income.

Where Android tablets still have a fairly bright future is in the enterprise. For many jobs, sitting down with a laptop is not possible. Instead, being active with a tablet can be preferable. Today, Samsung unveils the Galaxy Tab Active2 -- a rugged Android 7.1 business tablet with integrated LTE (carrier unlocked). It is very rugged (MIL-STD 810G certified) making it great for dirty jobs -- even the S-Pen is rugged. And yes, it has USB-C.

Continue reading

New partnership delivers data-driven insights into customer behavior

Data analytics

Businesses have more data than ever about their customers, but it can be hard to extract meaningful insight from it.

A new partnership between data warehousing company Snowflake Computing and data analytics platform Segment aims to give enterprises the ability to carry out rapid analysis of customer data at scale.

Continue reading

Automated simulation platform helps enterprises understand cyber risks

data threat

Hackers and cyber criminals often seek to exploit human errors like misconfigurations, poor security practices and the use of shadow IT.

In order to help businesses assess the risk XM Cyber is launching an automated advanced persistent threat (APT) simulation platform, HaXM, to continuously expose all attack vectors, above and below the surface.

Continue reading

Businesses are failing to understand the impact of cloud outages

cloud worry

Many firms in the UK are failing to understand their responsibilities in relation to systems in the cloud, according to a new study.

The research from Veritas Technologies shows that 66 percent of respondents believe that dealing with cloud service interruptions is the primary responsibility of their cloud service provider.

Continue reading

Netskope brings continuous assessment and monitoring to IaaS security

IaaS

Cloud access security specialist Netskope is launching an expansion of its Infrastructure as a Service security offering to add continuous security assessment and monitoring capabilities.

With this release customers can use Netskope for IaaS to continuously assess their infrastructure-as-aservice (IaaS) and platform-as-a-service (PaaS) configuration in AWS, with Microsoft Azure to follow soon.

Continue reading

SAP CRM servers vulnerable to online attack

hacker

Researchers at cyber security platform ERPScan have disclosed details of two vulnerabilities that allow compromise of the widely used SAP CRM system.

CRM is considered as a most critical asset by businesses. A data breach into CRM can be disastrous as it can destroy trust in the business and severely tarnish the brand as well as raising compliance issues.

Continue reading

70 percent of companies would fail an access control audit

Admin login

A new study into privileged access management from account protection specialist Thycotic shows that while over 60 percent of organizations must satisfy regulatory compliance requirements surrounding privilege credential access, a worrying 70 percent would fail an access controls audit.

Access to privileged accounts allows more rights and permissions than those given to standard business users, yet 51 percent fail to use a secure logon process for these accounts.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.