Michael Suby

Michael Suby
Research Vice President, Security Products Group, IDC Corporate USAMichael Suby is the Research Vice President, Security Products Group.
News mentions
VIPRE Security Group, an award-winning cybersecurity, privacy, and data protection business, for the first time, is named a Major Player in the IDC MarketScape: Worldwide Modern Endpoint Security for...
Acronis, a global pioneer in cyber protection released the findings of its benchmarked cyber threats report for the second half of 2023. Cyberthreat report Titled “Acronis Cyberthreats Report,...
Malwarebytes, a pioneer in real-time cyber protection, is revolutionising endpoint protection for IT-constrained businesses with EDR Extra Strength, a new solution that combines the company's dee...
Acronis, the global pioneer in cyber protection announced the general availability of Acronis Advanced Security + Endpoint Detection & Response (EDR) for Acronis Cyber Protect Cloud. Comprehensiv...
Acronis, a global pioneer in cyber protection, announced the enhancement of its security defence against advanced fileless attacks using Intel® Threat Detection Technology (Intel® TDT) leverag...
Acronis, a global pioneer in cyber protection, released its latest cyber threats and trends report for the second half of 2022. It found that phishing and the use of MFA (Multi-Fa...
Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally, launches Check Point Harmony, the first unified solution to enable secure connectivity to any resource anywhere...
Malwarebytes, an advanced endpoint detection and remediation solution provider, announced a new set of enhanced enterprise features of its cloud platform. The platform, Malwarebytes Nebula, reduces th...
Key people from IDC Corporate USA
Security experts
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download