Category: Features & Releases

  • March 26, 2015

    In previous posts we described the five types of perpetrators who threaten your data and the challenges to securing Intellectual Property (IP). Now we’re taking a closer look at the four main attack models and what you can do to prevent attacks on your data from happening in the first place.

    Posted In:
  • March 24, 2015

    The Perforce Partner Summit is the annual kick-off for our channel partners. It is part of a rich menu of channel enablement tools and activities that are open to all distributors, VARs, consultants and SIs that engage in selling or implementing Perforce.

    Channel enablement is an important part of what we do at Perforce. Given the complexity of modern product development, it’s critical that we work closely with all the providers of technology and services that contribute to the infrastructure for releasing products quickly and efficiently.

    Our Partner of the Year award went to Dragonsoft.

  • March 19, 2015

    It seems a day doesn’t pass without some new data theft issue in the headlines. These attacks are made for economic gain, competitive advantage, espionage or some mix of the three.

    Threat Bee

    Posted In:
  • March 13, 2015

    The world of model-based design got a big boost last week with the release of P4SL, our Open Source integration with Mathworks’ flagship products, Simulink, the leading simulation and modeling tool, and MATLAB, the popular numerical computing environment.

    Simply put, you can now perform all the most common Perforce operations from within Simulink and MATLAB on pretty much any object you can right-click on—in most cases, there’s no longer a need to context-switch between Perforce and Simulink or MATLAB.

    Posted In:
  • March 12, 2015

    Cyber attacks and data breaches of large corporations have increasingly become more common and more frequent. No longer confined to the retail segment, the world’s biggest data breaches (>30,000 records) now touch almost all major industries, including financial services, tech, gaming, government, healthcare, telecoms, military, and media. It’s not uncommon for cyber attacks that access sensitive IP to be related to blackmail and extortion threats. Data breaches can damage a company’s brand reputation and greatly reduce customer trust. It can also result in hundreds of millions of dollars of damages related to reduced sales, consumer credit monitoring services and legal fees.

    Posted In:
  • March 03, 2015

    Today Perforce announced Helix, the next generation of our product line. We’ve been working on it for a long time, and we’re excited to share it with you.

    Perforce Helix

    Posted In: