Proofpoint Announces Second Quarter 2021 Financial Results | Proofpoint US

Proofpoint Announces Second Quarter 2021 Financial Results | Proofpoint US

Second Quarter Highlights Total revenue of $308.7 million, up 19% year-over-year Billings of $328.6 million, up 31% year-over-year GAAP EPS of $(0.92) per share, Non-GAAP EPS of $0.63 per share Operating cash flow of $60.9 million and free cash flow of $54.8 million SUNNYVALE, Calif., – July 29, 2021 – Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced financial results for the second quarter ended June 30, 2021. “We were very…

Read More

Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks

Tenable Helps Organizations Disrupt Attacks with New Active Directory Security Readiness Checks

In the wake of a growing number of both ransomware and sophisticated attacks, Tenable®, Inc., the Cyber Exposure company, has developed 10 foundational configuration checks for its solutions, including Tenable.io, Tenable.sc and both Nessus Professional and Nessus Essentials, that assess Microsoft Active Directory security readiness and align remediation efforts based on the threat landscape. These checks leverage Tenable’s expertise in securing Active Directory environments through Tenable.ad and are available immediately for existing customers at no…

Read More

Join us for an episode of The Gateway Triangle podcast: Featuring Pierce Vasale – Cisco Blogs

Join us for an episode of The Gateway Triangle podcast: Featuring Pierce Vasale – Cisco Blogs

The Gateway Triangle is a new podcast series featured on The Global Gateway, Cisco’s customer advocacy community with thousands of advocates worldwide! I host the podcast along with my colleague, Katie Meerstein. The podcast features team members from Cisco’s Global Advocacy organization, as well as our valued customer advocates who make The Gateway possible. We love to keep it laid back while we discuss tech, advocacy, and life in general. We’re back with another episode…

Read More

How Cisco Never Left Me – Cisco Blogs

How Cisco Never Left Me – Cisco Blogs

This post was written by Jonathan Austin a Cisco Hardware Engineering Intern. I never would have thought that a company could manifest its culture in so many areas of my life, from my career, to my personal life, and to where I hope to see myself one day. Let’s rewind. In my 3rd year at San José State University, I was still trying to figure out what career building was and wondering if Electrical Engineering…

Read More

The Modern Security Operation Center – Cisco Blogs

The Modern Security Operation Center – Cisco Blogs

Every organization regardless of size, budget or area of focus should have some form of a security operation center (SOC). When I use the term “Security Operations Center”, many people imagine a dedicated team with expensive tools and a room full of monitors. That image can be a SOC, but it is not always the case. A SOC can just be one person or multiple groups of people spread across the globe. A SOC can…

Read More

“Real Estate for a Purpose”: Cisco unveils hybrid work plans and tech to support distributed teams

“Real Estate for a Purpose”: Cisco unveils hybrid work plans and tech to support distributed teams

After a year of WFH, companies are offering a mixed bag of flexible work arrangements. In the hybrid work era, the traditional office is getting a makeover to assist workers on-site and elsewhere. Image: GettyImages/Westend61 On Thursday, Cisco published two blog posts outlining its hybrid work strategy and company tech enabling distributed workforces. While the articles provide a specific glimpse into the strategy and approach for one tech titan, the underlying concepts of enabling remote…

Read More

VMware #1 in Worldwide IT Automation and Configuration for Fourth Consecutive Year by Global Analyst Firm

VMware #1 in Worldwide IT Automation and Configuration for Fourth Consecutive Year by Global Analyst Firm

News Detail PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced that leading analyst firm IDC ranked VMware No. 1 by market share in the worldwide IT automation and configuration management (ITACM) software market (1) for 2020. As the industry requirements for IT automation and configuration management software shift to optimize applications and infrastructure supporting digital … Thu, 29 Jul 2021 00:00:00 PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced that leading…

Read More

Viewing enabled and running services on Linux with systemctl

Viewing enabled and running services on Linux with systemctl

A vast majority of Linux systems these days are using systemd – a suite of programs aimed at managing and interconnecting different parts of the system. Systemd started replacing the init process back in 2014 and is now the first process that starts when most Linux systems boot. To get a quick peek, you can run a command like this, which verifies that process 1 is indeed systemd. On this system, two additional systemd processes are currently also…

Read More

Cisco preps now for the hybrid workforce

Cisco preps now for the hybrid workforce

Work-from employees will no longer be treated as a second-class citizen, which means they will get best-in-class technology including SD-WAN appliances, cellular backup alternatives, zero trust security support and maybe even battery backup. That’s at least part of the plan for hybrid workers now and moving forward, said Cisco’s Todd Nightingale, executive vice president and general manager of the company’s Enterprise Networking & Cloud business. “The ‘return-to-office’ concept is a myth–it’s a world we have…

Read More

Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

Phishing Attacks Often Target Small Businesses – Here’s What to Watch for

Scammers target businesses with phishing emails all the time, pretending to be legitimate customers or vendors asking for payment. While any company can be vulnerable to this type of attack, small- to medium-size companies are particularly vulnerable because it is easier for a scammer to do a bit of research online and identify the right people to impersonate or send a phishing email to. A quick social media search or a visit to a corporate…

Read More
1 3,611 3,612 3,613 3,614 3,615 4,236