Microsoft Corporation News
Biometrics company, Fingerprint Cards AB (Fingerprints) has experienced growing demand for its biometric authentication solutions, with over 1.5 billion sensors shipped worldwide since 2014. Fingerprints was a pioneer in biometric solutions for Android smartphones before beginning a program of strategic diversification into the PC, access control, and payments markets. In November 2021, Fingerprints formed two subsidiaries to further enhance their strategic and financial opportunities in the co...
Cohesity, a provider of next-gen data management, announced it was named a Leader and an Outperformer in two GigaOm Radar reports: the GigaOm Radar for Hybrid Cloud Data Protection: Large Enterprises and the GigaOm Radar for Hybrid Cloud Data Protection: Small and Medium-Sized Enterprises. This is the third time Cohesity was named a Leader in the Large Enterprises report. Cohesity is acclaimed for offering “strongly differentiated cyber resiliency features,” “great data manag...
Johnson Controls, the globally renowned company for smart, healthy and sustainable buildings, was named Global Sustainability Changemaker and U.S. IoT Partner of the Year at the Microsoft’s annual awards. The Sustainability award was made for the significant societal impact that Johnson Controls OpenBlue Enterprise Manager is having on boosting sustainability in buildings, improving ESG scores and enabling data-driven decision-making by customers. IoT Partner award for Johnson Controls...
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally...
Bold Group, part of EverCommerce's Security & Alarm solutions, a provider of alarm monitoring and integrated business management software for the security industry, announces the launch of Managely™, a business management solution designed for the unique needs of the security industry. The new software platform, which was introduced at Converge 2022, the company’s inaugural customer conference dedicated to transformation and innovation within the industry, helps security compani...
Lumeo, a designer of computer vision solutions, announces the integration of the Microsoft Azure Face Service with its ever-growing library of vision AI (Artificial Intelligence) models and analytics. The Azure Face Service provides AI algorithms that detect, recognise, and analyse human faces in images. Lumeo is an open and flexible video analytics platform that addresses the specific business challenge of bridging the latest AI models and techniques with a growing audience attempting to bring...
Vicon Industries, Inc., a subsidiary of Cemtrex Inc., designer and manufacturer of video surveillance and access control software, hardware, and components, is set to exhibit at ISC West 2022 which will be held from March 22 to March 25, 2022, at the Venetian Expo, in Las Vegas, Nevada, USA. Attendees are warmly invited to visit the company, at booth #7083, at ISC West 2022 the exhibition venue. The Vicon exhibit will focus on Vicon’s centralised video management, access control, and lice...
Today’s enterprises are being challenged to stay one step ahead of security threats. Data shows that in 2021, the average cost of a data breach reached US$ 4.24 million, up from US$ 3.86 million in 2020, and the highest in 17 years. The surge in flexible and hybrid working arrangements (Working From Anywhere – WFA) is making an already challenging situation even more complex. Leaders now need to decide how to combine enterprise-level security with current working models. The timing...
IDEMIA, the provider of Augmented Identity has entered into a global collaboration with Microsoft aimed at delivering next-generation eSIM and connectivity solutions for consumer and M2M/IoT devices. The collaboration will bring together IDEMIA’s advanced connectivity solutions and longstanding industry expertise with Microsoft’s trusted cloud platform to improve support of eSIM services around the world. Geo-redundancy capacities IDEMIA provides connectivity solutions that enable...
Device Authority, a globally renowned company in identity and access management (IAM) for the Internet of Things (IoT), and Trusted Objects, a global player in cyber security technologies for embedded systems and cloud device management platforms, have announced their integration between TO-protect software root-of-trust (RoT) and KeyScaler IoT platform. Last year, Trusted Objects joined the KeyScaler Ready programme, which enabled both teams to work closely together to provide a combined solut...
HID Global, a pioneer in trusted identity solutions, announces that users of its cloud-based PKIaaS offering can now automate the lifecycle management of digital certificates used with devices managed via the Microsoft Intune mobile device and application management service. The HID solution eliminates the need for human intervention when issuing and renewing certificates that enable employees to use their mobile devices to easily access their organisation’s resources through Wi-Fi networ...
Type of site: Grade A multi-tenant office Location: The Bailey, 16 Old Bailey, London, UK Site size: 115,000 sq. ft over ten floors Client needs: Easy access for users Touch-free and digital sign-in Free flowing movement through reception, avoiding crowds and queues Fast access to other floors via lifts Visitor management system that can be used by multiple tenants and reception staff easily Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and tra...
Allegion, a global provider of security products and solutions, has announced the first integration between Overtur, Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management, and Software for Hardware, an industry-renowned software developed for door, frame and hardware distributors. Software integration The partnership announcement comes in advance of the DHI conNextions 2021 conference, where both companies will be demonstrati...
Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organisations can now use Fugue to secure infra...
UK-based cyber security start-up, Robo Shadow, launches their initial product set as they attempt to take on the big guns in cyber security. The platform boasts a range of features including vulnerability scanning, hardware and software reporting for all the devices, reporting on Windows Defender centrally (removing the need for third-party anti-virus) and much more. Terry Lewis, CEO and Prolific Tech Investor, states that "We want to democratise cyber security, by removing the cost and the com...
Cymulate, the industry standard for SaaS-based Continuous Security Validation, has announced the launch of two new solutions, to enable businesses to validate their security technologies and policies. Attack Surface Management (ASM) discovers exploitable external assets, and Vulnerability Prioritization Technology (VPT) that integrates with vulnerability scanners, to reduce risk exposure time on internal assets. These new offerings empower security teams, to efficiently prioritise vulnerabiliti...
Fingerprint Cards AB (Fingerprints™) announces that the company’s new biometric solution for the PC market is integrated in the power button of the Latitude 5000 and 7000 Series of laptops from Dell. Thus far, Fingerprints has been awarded design wins with three of the world’s top five PC manufacturers. Consequently, they expect to be able to announce further PC models in the near future, which feature Fingerprints’ new biometric PC solution. Supporting different design...
It has long been recognised that no one is safe from cyber-attacks, but some sectors face a much higher level of threat than others. Critical infrastructure sectors such as utilities, energy and industrial manufacturing are some of those that face an intense level of interest from cyber criminals and nation-state groups across the globe. The impacts of a successful attack can have detrimental consequences, for both the cyber and physical side of the business, in terms of business disruption, ec...
Aqua Security, the pure-play cloud-native security solutions company, has announced the availability of its new Aqua Platform, with a unified console to ease the journey from scanning and visibility to workload protection in cloud-native environments. Aqua Platform The new Aqua platform reduces administrative burden and allows security teams to start with scanning and cloud security posture management (CSPM) capabilities, then add in sandboxing capabilities and workload protection as needed. T...
Vectra AI, a globally renowned company in threat detection and response, has announced that the Vectra Cognito platform delivers key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers. Vectra AI Vectra AI is uniquely positioned as an integral part of the model, which assumes breaches by investigating the behaviour of users, workloads, networks, and devices as though they originate from an untrusted network by leveraging its analytics and understanding of users and accounts...
Fugue, the company helping organisations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development a...
ProdataKey (PDK), manufacturer of the renowned cloud access control platform built for mobile, now offers integration between its Pdk io software and Microsoft Azure Active Directory. IT departments that rely on Active Directory to simplify user and rights management across their corporate network may now use that same interface to seamlessly manage permissions within Pdk io software. System administrators can fully control the physical access of people and groups, as well as issue mobile and t...
In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?
The threat actor behind the SolarWinds attack, the Russian-based Nobelium, has orchestrated another successful vendor email compromise attack, this time targeting the United States Agency for International Development (USAID). According to the Microsoft Threat Intelligence Center (MSTIC), Nobelium compromised the USAID’s Constant Contact account, so as to send phishing emails that included links containing malware. Zero-day phishing attacks The incident highlights how zero-day, never-se...
Senstar, a pioneer in video management and perimeter intrusion detection solutions, announces the launch of its Senstar Symphony common operating platform with sensor fusion engine, a modular solution for security management and data intelligence. In addition to being an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. “What truly sets Senstar Symphony apart from other systems i...
Clavister, a globally renowned company in high-performance cyber security solutions, has announced the launch of the latest generation of Clavister NetShield Virtual, highly regarded as one of the world's fastest virtualised solution for securing 5G networks. With data rates of over 600 Gbps on a single Intel Xeon-based server, Clavister sets a new high-water mark for 5G Security capacity. Virtualised solution for 5G networks With the proliferation of virtualisation, there has been a steady i...
In the current world, a vast majority of a company’s sensitive data resides in Software as a Service (SaaS) applications like Office 365, Google Workspace, Salesforce, Dropbox, etc. In the recent 2020 State of SaaSOps report by BetterCloud, their data suggests that 85% of all application usage by 2025 will be via SaaS. For those who’re an MSP or IT service provider reading this, they should be thinking, “Oh snap!!! What can I be doing to better protect the sensitive data in th...
Fugue, the company transforming cloud security to help organisations innovate faster, announces it has added support for Google cloud to its multi-cloud security platform. With Fugue, cloud engineering and security teams can secure their entire cloud development lifecycle (CDLC)—from infrastructure as code to production—across their Amazon Web Services (AWS), Microsoft Azure, and now Google cloud environments using the same Cloud Security Posture Management (CSPM) solution. Multipl...
Check Point Research (CPR) reports that since the recently disclosed vulnerabilities on Microsoft Exchange Servers, a race has started between hackers and security professionals. CPR is seeing hundreds of exploitation attempts against organisations world-wide that are related to the four zero-day vulnerabilities currently affecting the Microsoft Exchange Server. In the past 24 hours alone, CPR has observed that the number of exploitation attempts on organisations it tracks doubled every two to...
Vectra (Vectra AI), a globally renowned company in network detection and response (NDR), has reported that in calendar 2020, sales continued to grow at a compound annual rate exceeding 100 percent and sales of Cognito Detect for Microsoft Office 365 accelerated, growing at a rate of 340 percent. These trends were driven in part by the rapid adoption of Microsoft Office 365 productivity applications, such as Microsoft Teams and heightened cyber security concerns, in the wake of numerous high-pro...
Browse security news
- By event
- Data Centre & Cloud Innovation Summit 2025
- Inter Airport Southeast Asia (IASEA) 2025
- ISC West 2025
- G2E Asia + Asian IR Expo 2025
- 6th European Forum on Global FDI Reviews
- Security LeadHER 2025
- DSEI Germany 2027
- SPIE Photonics West 2025
- Integrated Systems Europe (ISE) 2025
- PACC 2025
- 27th CMDA IT Expo 2025
- View more
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Milesight 4x5MP AI Multi-Directional Camera
Anviz AI-driven Fisheye Dome Network Camera
2025 Trends in video surveillance
Download7 proven solutions for law enforcement key control and asset management
DownloadMaximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadThe truth behind 9 mobile access myths
Download