Rainier Client Coverage & Content

Read Coverage

HelpNetSecurity: Versasec unveils vSEC:CMS S-Series v5.4

Versasec unveils vSEC:CMS S-Series v5.4

Versasec, the leader in smart card management systems, rolled out the latest generation of its flagship identity and access management (IAM) solution. vSEC:CMS S-Series v5.4 incorporates a variety of important new features, including new console capabilities and support for Gemalto eToken 5300 and the Matica 8300 card printer.

Read Coverage

ZDNet: Are IoT security standards around the corner?

Are IoT security standards around the corner?

Video: Interview with NanoLock CEO and Co-founder Eran Fine.

Read Coverage

New-TechEurope: Device Protection, Management and Secured OTA

Device Protection, Management and Secured OTA

From embedded to cloud¸ NanoLock Security provides the industry’s only lightweight¸ unbreakable¸ low-cost security and management solution for connected edge devices. Using virtually zero computing and power resources¸ NanoLock Security protects firmware and sensitive information stored on connected IoT devices¸ preventing attacks ranging from ransomware to malicious manipulation of stored code.

Read Coverage

SecurityWeek: NanoLock Launches Platform to Protect IoT Devices From Production Through End-of-Life

NanoLock Launches Platform to Protect IoT Devices From Production Through End-of-Life

Cybersecurity start-up NanoLock Security today announced a new lightweight security platform designed to add security into the small connected devices better known as the internet of things, rather than to overlay security around those devices.

This is security designed to safeguard small devices from the production line through to the end of life and beyond; to allow secure updates but to prevent hacking and tampering; and to ensure the integrity of data from the device outwards.

Read Coverage

Cyber Defense Magazine: Security Automation Is More Than Automation

Security Automation Is More Than Automation

It’s no secret that security operations is under fire. In most enterprises, the only thing standing between a normal day and a financially devastating data breach is the security analyst. Yet, despite decades of investment in cyber security protection, detection, and intelligence tools, the analyst lacks a centralized software platform to operationalize all of this data in time to effectively prevent breaches from occurring. Drowning in a sea of alerts, and with the business on the line, SOC analysts are desperately seeking solutions. Automation is being hailed as the answer. But what does "security automation" really mean?