About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CyberArk Launches Industry’s First Identity-Centric Secure Browser

CyberArk Secure Browser Makes It Easy to Tailor Security, Privacy and Productivity Controls on Managed and Unmanaged Workforce Devices

CyberArk (NASDAQ: CYBR), the identity security company, today announced the general availability of CyberArk Secure Browser, the industry’s first identity-centric secure browser, providing enhanced security and privacy alongside a familiar, productive user experience.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20240327457893/en/

CyberArk Secure Browser provides enhanced security alongside a familiar user experience. (Graphic: Business Wire)

CyberArk Secure Browser provides enhanced security alongside a familiar user experience. (Graphic: Business Wire)

Backed by intelligent privilege controls and simple to deploy across devices, CyberArk Secure Browser is purpose-built for a cloud-first world, providing secure, consistent access to both on-premises resources and SaaS applications. It allows unprecedented visibility, control and governance for security teams, helping to prevent the malicious use of compromised identities, endpoints and credentials both at and beyond login. Secure Browser is a component of the CyberArk Identity Security Platform, enabling secure access for any identity — human or machine — to any resource or environment from anywhere, using any device.

“Increased usage of remote access, SaaS applications and cloud infrastructure created a security blind spot for us, prompting a rethink of our security posture and investment in tools to secure unauthorized access to critical assets via our distributed workforce,” said Chris Dove, Enterprise Architect, California Department of Finance. “Adding CyberArk Secure Browser to our existing CyberArk deployment will allow us to strictly enforce security policies without sacrificing productivity. We will be better able to safeguard our data, making sure employees can only access work systems through a secure, isolated browser that rotates passwords and keeps them from being saved – and potentially stolen.”

A March 2024 study of US office workers further highlights the browser-based cybersecurity risk exposure faced by organizations1:

  • 78% use the same device to access company-confidential and sensitive information as they do for personal browsing
  • 65% said that they need to violate organizational safe browsing policies to perform their role (12% “always” violated policies).
  • 59% save workplace logins and passwords in the web browser used to perform their job.

Available to customers of the CyberArk Identity Security Platform, CyberArk Secure Browser safeguards the organization’s most valuable resources, enabling a secure passwordless experience, easy access to privileged information and assets and helping to prevent breaches resulting from cookie theft and session takeover attacks. Recent major security breaches and new research from CyberArk Labs demonstrates how easy it is for techniques like cookie theft to give threat actors unauthorized access to sensitive data and assets, completely bypassing authentication tools. Secure Browser can ensure that there are no cookies to steal.

CyberArk Secure Browser Addresses Key Enterprise Cybersecurity Challenges

  • Secures all access – including privileged and sensitive access – from the browser
  • Fully integrates with the organization’s entire Identity and Access Management and security architecture
  • Provides a secure and safe way for users to access corporate resources from their own or unmanaged devices
  • Separates work and personal applications and domains
  • Enables easy, quick resource access for all user types, including high-risk groups
  • Streamlines ability to meet regulatory and audit requirements

“The proliferation of SaaS apps, cloud-native resources and business-critical applications that are accessed from the browser introduce new and significant risks that attackers have been quick to take advantage of,” said Matt Cohen, CEO, CyberArk. “Traditional access management approaches lack the right controls at the edge to be able to see and secure the complete identity journey, end-to-end. We are excited to deliver an enhanced enterprise browser that boosts productivity and layers on additional security and privacy controls to the most frequently used application in most organizations. This is just another example of how CyberArk is extending identity security to all users no matter how they access sensitive data and assets.”

Resources

1 Survey of 4,000 US office workers conducted by Censuswide

About CyberArk

CyberArk (NASDAQ: CYBR) is the global leader in identity security. Centered on intelligent privilege controls, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud environments and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on LinkedIn, Twitter, Facebook or YouTube.

Copyright © 2024 CyberArk Software. All Rights Reserved. All other brand names, product names, or trademarks belong to their respective holders.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.