Blue Coat Systems in pictures
News about Blue Coat Systems
Features about Blue Coat Systems
At an exclusive ARN Roundtable lunch select attendees discussed the evolution of the Cloud market, from the early days and its definition to the promise of the future and what apps and services are attractive to customers. Indeed, the Cloud market has moved beyond the start up phase and into mainstream usage. Cloud is no longer seen as a luxury, or an experimentation - it is now a necessity. It’s now about the implementation and execution of Cloud solutions, all with an eye to profit margins. Photos by MIKE GEE
Blue Coat Systems is being sold by one private equity firm to another for $2.4 billion as it is prepped to go public again after it was taken off the stock market in 2012.
Blue Coat Systems has named Damien Manuel as its new chief information security officer for Australia and New Zealand.
The Internet's seething Web of content resembles endless bubbles popping to the surface for only a day, then vanishing, a security study from Blue Coat Systems released today indicates. That means there are a huge number of new, unknown and transient sites daily, posing challenges to determine whether they are benign, or should be blocked as dangerous.
Blue Coat Systems today announced it has acquired anti-malware firm Norman Shark for an undisclosed price, in order to integrate its technologies, such as sandboxing, into other security products available through Blue Coat.
Traffic to Apple.com jumped by as much as 265 per cent in the five days following the release of the iOS update, according to Blue Coat Systems.
A report issued today by the Canadian group Citizen Lab says that network security hardware made by well-known manufacturer Blue Coat Systems is being used for political censorship by the repressive governments of Iran, Syria and Sudan.
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect potential security threats.
With hidden malware on the rise, the online advertising industry may finally have to get its governance act together.
- Large scale attack hijacks routers through users' browsers
- Minecraft used as cover to push Android scareware apps on Google Play
- Android's reset function fails to delete data from Samsung and HTC smartphones
- Hacked Adult Friend Finder database offered for $17,000
- Significant virtual machine vulnerability has been hiding in floppy disk code for 11 years
- Why optimisation is the name of the game at First
- Video, mobile show strong growth in IAB's Q1 online advertising report
- Twitter offers marketers objective-based advertising programs
- Coming to Firefox: Ads based on your browsing history
- Woolworths customer leader, Jess Gill, departs, following CMO out the door
- Exclusive Networks APAC posts bumper growth in first quarter
- Ingram Micro launches professional and training services for Aussie resellers
- Symantec's Holtzhausen to head Veritas channel business across APJ
- Barracuda and Aerohive partner for BYOD security
- More News
- 26 May
- IM Experience, Brisbane
- 26 May
- SplunkLive! Brisbane
- 26 May
- Entrepreneurial Marketing - Innovative Thinking to Create or Re-Invigorate your ...
- 26 May
- D-Link IP Surveillance Training and Certification
- View all events