CFOtech Asia logo
Technology news for Asia's CFOs and financial decision-makers

Visibility news stories

Story image
Solutions
Progress launches latest version of network visibility solution
In Flowmon 12 network solution, Progress has expanded its support for public cloud provider flow log monitoring and launched new features.
Story image
Digital Transformation
What CISOs think about cyber security, visibility and cloud
Seeking to uncover the minds of CISOs and CIOs across Asia Pacific, my company recently asked Frost & Sullivan to take a snapshot of cloud adoption behaviour in the region.
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
Artificial Intelligence
Databricks announces new offering for Unity Catalog
Databricks has significantly expanded data governance capabilities on the lakehouse by unveiling data lineage for Unity Catalog.
Story image
Cybersecurity
CrowdStrike doubles down on visibility with new graph database
CrowdStrike Asset Graph is a new graph database powered by the CrowdStrike Security Cloud, providing IT leaders with a 360-degree view into all assets.
Story image
Nutanix
Avoid the sugar high: Making the most of the government's SMB digital sweetener
With the federal election now behind us, small-to-medium businesses (SMB) in Australia still face the same challenges and opportunities they did just a few weeks ago.
Story image
CASB
Juniper expands SASE offering with data loss prevention capabilities
Juniper has announced the expansion of its SASE offering with the addition of cloud access security broker (CASB) and data loss prevention (DLP) capabilities.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Migration
Let’s clear the cloud visibility haze with app awareness
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Fortinet
Fortinet's Security Fabric hits new record for integrations
The Fortinet Security Fabric has surpassed 500 technology integrations with more than 300 Fabric-Ready Technology Alliance Partners.
Story image
Cloud
CloudBolt advanced capabilities aim to solve persistent problems
CloudBolt Software has announced advanced capabilities designed to overcome critical roadblocks many of the world's largest organisations are experiencing.
Story image
SD-WAN
Are you leveraging the full potential of SD-WAN?
The evolution of SD-WAN technology means it's now much more than it was originally sold to be, but do customers really understand the expanded value proposition?
Story image
BitTitan
How free migration tools compare with paid solutions
The road to the cloud follows two common paths: via economic first-party migration tools from public cloud providers or third-party solutions from specialist vendors.
Story image
Check Point
Check Point recognised for leading threat detection solution
"The latest ATT&CK Evaluations results highlight Check Point Harmony Endpoint’s leadership for the second consecutive year."
Story image
Amazon Web Services / AWS
ExtraHop brings greater security to cloud environments
ExtraHop has extended the power of Reveal(x) 360 to provide frictionless threat visibility for Amazon Web Services (AWS).
Story image
Cloud
Imperva releases API security solution as threats ramp up
Imperva has launched Imperva API Security with continuous API discovery and data classification, a product that can be deployed in any environment.
Story image
Collaboration
Why doubling down on corporate defence works so well
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Story image
Cybersecurity
How to make a business ‘invisible’ to hackers
Critical to every organisation is how to stop a cyber-security breach AND the damage it causes and do so within available budgets.
Story image
SaaS
Axonius launches first SaaS risk management product
SaaS management tools typically cater to the business side or the security posture management side, but each side is still prone to visibility gaps and information siloes.
Story image
BYOD / Bring Your Own Device
Is BYOD the final mile to Digital Transformation success?
The concept of bring your own device (BYOD) has been around for years, but since the shift to more remote and hybrid working around the world, its popularity has reached bold new heights.
Story image
Endpoint detection and response / EDR
CrowdStrike expands CrowdXDR Alliance with three new partners
"We established this community-driven approach to further extend partner value and deliver customers a holistic and simpler view of threats across the entire technology landscape."
Story image
Observability
LOGIQ.AI advances machine data management with DPaaS offering
"LogFlow enables our customers to take a whole new approach to observability data; one that helps regain control and unblock vendor or cost limitation."
Story image
Google Cloud
CrowdStrike extends Falcon Horizon support for Google Cloud
"This extended support from CrowdStrike Falcon Horizon for Google Cloud will give our joint customers the visibility and protection needed to stay ahead of the adversaries.”
Story image
Cloud Security
Imperva launches free security assessment service for Amazon RDS
"This should help practitioners through their cloud migration journey, to get full visibility on which data they hold and its true data-aware security posture.”