WHAT THE SUNDAY TERROR ATTACK MEANS FOR MALI—AND A... » At least two people have been killed in a tourist resort popular with westerners - Le Campement - in... Need to "Repeal the Perpetual Illegal Wars" » Charlie Savage of the New York Times reports in "Senators Wrestle With Updating Law Authorizing War ... After Terrorist Attack, Spain Rejected Its Hawks. ... » Email: sam@accuracy.org Husseini is communications director with the Institute for Public Accuracy.... Cisco includes Italtel’s enterprise SDN applicat... » Milan: Italtel has announced its Netwrapper application has been included in the official Cisco GPL ... InfinityQS upholds ISO 9001:2015 & ISO 27001:2013 ... » InfinityQS® International, Inc. (InfinityQS) has announced that it has successfully sustained its ce... New PT Application Firewall easier to deploy, co... » London: Cybersecurity expert Positive Technologies has announced a new version of its web applicatio... Logicalis acquires Packet Systems Indonesia to g... » London: Logicalis, an international IT solutions and managed services provider, together with Metrod... Revolutionary new AI event to launch in London -... » London: With discussion around artificial intelligence (AI) at an all-time high, MACHINA Summit.AI i... Basefarm acquires The unbelievable Machine Compa... » LONDON: Basefarm has announced their acquisition of the Berlin-based The unbelievable Machine Compan... PhishMe takes home SC Europe Awards 2017 » LONDON, UK: PhishMe® Inc. has announced that PhishMe Simulator™ and PhishMe Reporter® were recognise...

CLICK HERE TO

Advertise with Vigilance

SOCIAL BOOKMARK

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Defence and Security Strategy

PHOENIX: BeyondTrust has announced several of its privileged access management and vulnerability management solutions completed the Common Criteria certification. Common Criteria is an internationally recognized computer security standard that includes stringent review and testing. Achievement of this certification helps to assure that government agencies and global enterprises can confidently procure and use BeyondTrust’s best-of-breed solutions to reduce data breach risks and address compliance requirements without the added cost and complexity of additional product testing.

“Enterprises around the globe depend on the Common Criteria Certification to ensure the solutions they select perform securely and as promised,” said Brad Hibbert, chief technology officer, BeyondTrust. “With Common Criteria certification, organizations can be even more confident that BeyondTrust solutions will help secure their environments against insider threats and prevent unauthorized access to critical information systems.”

Enterprises and governments around the world can rely on BeyondTrust solutions to give IT organizations control over internal and external risks. The company provides a unique, unified platform combining privileged access management and vulnerability management solutions, enabling IT professionals and security experts to work together with greater control and enhanced efficiency.

“Businesses around the globe are very focused on improving efficiency, cost savings and security in all information technology procurements,” added Hibbert. “Devoting time and resources to independent testing solutions adds unnecessary complexity and costs to the selection process. Utilizing Common Criteria certified vendors help them more effectively secure and modernize their IT systems.”