iTnews
  • Home
  • News
  • Technology
  • Security

META and SecurePipe form partnership

By Jon Tullett on Mar 26, 2004 5:46PM

META and SecurePipe have joined forces to offer managed security and compliance.

META Security Group, Inc., a provider of information security products and consulting services, and SecurePipe, Inc., a managed network security solutions vendor, have formed a strategic alliance to deliver integrated security solutions, targeting customers needing to ensure compliance with GLBA and HIPAA. "Both companies have extensive in-depth knowledge of business processes in major vertical markets such as financial services, manufacturing, health care, utilities and commerce," said Art Roldan, SecurePipe's CEO.

The companies will combine SecurePipe's managed network security services (MSSP) and META Security Group's compliance assessment capabilities and policy and Command Center, its vulnerability management solution.

www.metasecuritygroup.com

www.securepipe.com

 

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
andformmetapartnershipsecurepipesecurity

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Jon Tullett
Mar 26 2004
5:46PM
0 Comments

Related Articles

  • Online safety committee tags algorithms, encryption as perilous
  • Google, Meta push back against changes to privacy laws
  • Meta accused by whistleblower of skimping on safety in Australia
  • Home Affairs says end-to-end encryption is detrimental to public safety
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.