Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MEDFORD, NJ and LISBON, PORTUGAL -- (Marketwired) -- 10/29/13 -- Watchful Software, a leading provider of data-centric information security solutions, and Tellumat, a specialized IT distributor, today announced that they have signed a distribution agreement empowering Tellumat to offer Watchful Software's advanced persistent security products to the South African market. Tellumat will provide sales and support capabilities for Watchful Software's line of security products, including RightsWATCH and TypeWATCH, to their value-added-reseller (VAR) channel in South Africa.
"Tellumat had witnessed a growth in demand from its partner community for new and innovative products to address the IT security issue of how to protect organizations from data loss and leakage. We conducted a technical review of a number of vendors in this space and found that Watchful Software with its RightsWATCH solution had developed an exceptional product that matches the needs of the South African market," said Bennie Langenhoven, Managing Executive for Communication Solutions at Tellumat. "This strategic partnership with Watchful Software will allow Tellumat to deliver to its resellers a truly competitive technology advantage when addressing their customer needs."
"Signing the partnership with Tellumat is excellent news for Watchful Software. Tellumat is renowned for its sales, marketing and technical skills that support their channel partners and lead the market with cutting edge solutions," said Justine Cross, Watchful Software's Business Development Executive. "RightsWATCH will allow Tellumat's partners to address the growing market and technology demand for advanced persistent security technologies in light of today's constant information threats."
Watchful Software's product portfolio encompasses RightsWATCH, a software solution that unifies data classification, with information rights management and data loss strengths and functionalities to prevent security breaches or disclosure, resulting from malicious wrongdoing or inadvertent misusage; and TypeWATCH, an e-Biometrics tool that leverages the science of keystroke dynamics to identify and authenticate users, with extremely high levels of accuracy, simply by the way they type on a keyboard.
About Watchful Software - www.watchfulsoftware.com
Today, sensitive information is all too often lost, leaked and sent where it shouldn't be; hence a CIO's top priority has become stopping this trend. Watchful Software lets enterprises easily address two of the most critical questions facing CIOs and CSOs today -- how do I protect my company's greatest asset (outside of its people), which is its information? And, in today's world of increasingly complex cybercrimes, how do I constantly ensure that the people accessing that information are who they say they are? Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, the company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss.
About Tellumat - www.tellumat.com
Tellumat specialises in products, services and solutions aimed at the communications, defence and electronic contract manufacturing markets and our mission is to focus on understanding our customers' needs and forming long term strategic alliances with like-minded enterprises worldwide. With the Distribution of foreign products comes the Social Responsibility and Broad Based Black Economic Empowerment requirements when doing business in South Africa, and Tellumat will work with Watchful to ensure that these aspects meet and exceed local requirements.
Add to Digg Bookmark with del.icio.us Add to Newsvine
For more information, please contact:
Rui Melo Biscaia
Watchful Software
Email Contact
Joanne Hogue
Smart Connections PR
+1 (410) 658-8246
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs