XYPRO Technology Corporation
  • Products
    • Risk Management &
         Real-Time Threat Detection
    • Enterprise Identity &
         Access Management
    • Secure Database Management
    • Trusted Security &
          Implementation Services
    • SAP HANA and Linux Security
    • HPE Software From XYPRO
  • Resources
    • News & Insights
    • Events
    • Case Studies
    • Webinars
    • How-to Videos
  • About Us
    • The XYPRO Way
    • Giving Back
    • Leadership
    • Careers
    • Internships
    • Partners
  • Support
  • Contact
Select Page

Category: News

11 Cybersecurity Threats for 2020 (Plus 5 Solutions)

11 Cybersecurity Threats for 2020 (Plus 5 Solutions)

April 23, 2020Steve Tcherchian
Zoom Hacks and Cybersecurity While Working From Home!

Zoom Hacks and Cybersecurity While Working From Home!

April 14, 2020XYPRO Team
COVID-19 Is Making Businesses More Vulnerable Than Ever to Phishing, Smishing and Vishing

COVID-19 Is Making Businesses More Vulnerable Than Ever to Phishing, Smishing and Vishing

April 9, 2020Steve Tcherchian
New Collaboration Tools Mean new Security Risks

New Collaboration Tools Mean new Security Risks

March 19, 2020Steve Tcherchian
COVID-19 and Tech: New Collaboration Tools Mean new Security Risks

COVID-19 and Tech: New Collaboration Tools Mean new Security Risks

March 19, 2020Steve Tcherchian
Never Delete an App Without Doing These 4 Things First

Never Delete an App Without Doing These 4 Things First

March 11, 2020Steve Tcherchian
It is a Myth That in Order to act Like a Leader you Need to act Powerful

It is a Myth That in Order to act Like a Leader you Need to act Powerful

March 5, 2020Lisa Partridge
Inspirational Women in STEM and Tech

Inspirational Women in STEM and Tech

February 27, 2020Lisa Partridge
MGM Guest Data Released Online

MGM Guest Data Released Online

February 20, 2020Steve Tcherchian
Working in Cybersecurity

Working in Cybersecurity

December 18, 2019Steve Tcherchian
Top Security Tips for Entrepreneurs

Top Security Tips for Entrepreneurs

October 22, 2019Steve Tcherchian
Why Cloud Containers Are Vulnerable

Why Cloud Containers Are Vulnerable

August 7, 2019Steve Tcherchian
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Risk Management & Real-Time Threat Detection

XYGATE SecurityOne
XYGATE Appliance Sentry Monitor
XYGATE Access Control
XYGATE Object Security
XYGATE Safeguard Manager
XYGATE CMON

Enterprise Identity & Access Management

XYGATE Identity Connector - SailPoint
XYGATE Identity Connector - CyberArk

HPE Software

XYGATE Merged Audit (XMA)
XYGATE User Authentication

Secure Database Management

SQLXPress
MARS
Discover
Partner

Trusted Security & Implementation Services

Solutions Implementation
Security Reviews
Security Education

  • Follow
  • Follow
  • Follow
  • Follow
RESOURCES ABOUT
News & Insights About Us
Events Leadership
Videos Careers
Webinars Internships

XYPRO Headquarters
4100 Guardian St., Suite 100
Simi Valley, California 93063 USA

+1 805-583-2874

USA/Canada: [email protected]
Asia Pacific: [email protected]
EMEA: [email protected]
Ibero America: [email protected]
Japan: [email protected]

Home   |   Contact  |   Privacy Policy  |   Support Login

©2023 XYPRO Technology Corporation. All Rights Reserved.


Privacy Settings