Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
Guides
Virtualisation
In IT, system resources, including both software and hardware components, can often be unnecessarily complex for the user base and virtualisation is a term used for the presentation of resources to users in a more simplified manner. An example may be the multiple servers appear as a single resource or remote disks appear simply as a drive on the desktop.
VMware Ready status for backup and recovery software
Barracuda Backup gains VMware Ready status and is now available on the VMware Solution Exchange
Extended support for Microsoft virtual deployments
Barracuda's Next-Generation firewall provides security support for virtual machines as part of the Microsoft Azure certified programme
Cyber security report: 96 percent of organisations have experienced a serious incident in past year
Sponsored by ForeScout Technologies, the 2014 Cyber Defence Maturity Report is independent research conducted by IDG Connect during May and June of 2014. Survey respondents included 1600 IT information security decision makers in organisations of more than 500 employees, and spanning five industry s
Microsoft deployment support from NG firewall
Azure, Hyper-V and Windows remote desktop now all supported in the latest next-generation firewall release from Barracuda Networks
Turning the tides against cybercrime
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
Online resource for web-based malware analysis
Barracuda's Threatglass provides a new resource for visualising and analysing the latest web-based malware
Network access control rated as highest cyberthreat defence
A report has been published on cyberthreat defences that rates network access control as having the highest potential for counteracting threats
Next generation firewall for remote locations
WAN optimisation and integrated content security feature on Barracuda's next-generation F280 Firewall for use in branch offices and remote locations
IT Operational Intelligence for Portsmouth Hospitals
An NHS Trust in the south of England will gain high visibility of the clinical and administrative applications that it operats with the use of the EH2000V virtual appliance from ExtraHop
Web filtering for virtual appliances
Microsoft's Hyper-V virtual appliance gains new web filter and secure gateway from Bloxx
Automated threat response collaboration
Real time threat intelligence and automatic advanced malware mitigation result from collaboration between Bromium and ForeScout
Enhanced virtualization support for next generation firewall
The latest version of Stonesoft's next generation firewall includes support for virtualisation and API for security management center
Web security appliance with Hyper-V and IPV6 support
Latest operating system for WatchGuard XCS appliance provides e-mail and web security with support for Microsoft Hyper-V and IPV6
Cloud backup with longer retention
Barracuda Backup now features extended cloud storage and longer retention periods without the need for dedicated local appliance
T-Series appliances protect increasingly complex networks
Tufin is addressing the increased complexity of corporate networks incorporating virtualisation and IPv6 with a new set of network security appliances
Automation company introduces strategic partnership for industrial cyber security
Rockwell Automation has announced an initiative to help manufacturers reduce security risks to control systems in response to growing cyber-security threats. The initiative will help automation and IT professionals more effectively secure their industrial processes with a combination of control syst
Passive vulnerability scanner for extended BYOD networks
Networks encompassing BYOD and virtual infrastructures can now meet their security and compliance criteria with the help of passive vulnerability scanning
ONVIF support on Maxpro NVR range
Honeywell improves network video recorder range with ONVIF support and smart video motion detection technology
High performance network for Liverpool retail park
The Liverpool One shopping complex has taken IT network services from Honeywell Building Solutions for business critical control systems
On demand cloud encryption services
Crypto Hypervisor from SafeNet provides on-demand high assurance key vaulting and encryption for cloud operations
Intercom systems on show at IFSEC
Commend UK will displaying the latest virtual server intercom systems as part of its portfolio at IFSEC 2013 in Birmingham
Partnership brings remote access security to data centres
Signify has partnered with MTI to provide business customers with remote access security through two-factor authentication (2FA)
Technology trends in cyber security
Leon Ward of Sourcefire examines the way cyber threats are developing and what can be done to cope with the changing threat landscape
Cyber criminals focus on lucrative malware for 2013
BitDefender predicts the 2013 cyber threat landscape with more focus on lucrative strains of banking trojans and other related malware
Network security product range addresses mixed network environments
Palo Alto has launched a new range of products to provide higher levels of network security in modern environments comprising mixed virtual and physical environments
Training event to offer 15 information security courses
Annual London IT security training event to take place in Covent Garden at the end of October offering courses in 15 IT security subjects
Cloud Security Education To Take Place In Gulf Region
SANS is bringing virtualization and private cloud security to the Gulf 2012 event taking place in Dubai
Browser Sandboxing Feature on Avast 7
Avast's latest version of its internet security suite provides users with virtualisation benefits with its sandbox and safezone features
Virtualisation Benefits For PC Antivirus Software
Version 7 of Avast Internet Security brings the benefits of virtualisation to individual PC users
VMware virtual environment security
Security for Virtualised Environments from BitDefender integrated with vShield 5 Endpoint from VMware
Top IT Security Skills Identified In Career Impact Survey
Optimistic results of the 2012 career impact survey for information security professionals include high hiring outlook and good career prospects for qualified professionals
POE Single Door Controllers Added To Pro-Watch
Honeywell access control management system gains enhancements enabling the addition of single Power-over-Ethernet door controllers to the network
Disaster Recovery Advice From Lieberman Software
Philip Lieberman provides information on achieving effective disaster recovery plans
Virtual Secure Web Gateway Protection
Sophos virtual appliance provides web malware protection and internet filtering
Lights-out Data Centre Uses Mobotix CCTV
An Oxford University data centre is using a combination of biometrics, IP video surveillance and remote management to ensure secure lights-out operations
Firewall Policy Management In Cloud Environments
Michael Hamelin of Tufin Technologies explains the silver perimeter surrounding cloud computing environments
Information Security Standard of Good Practice
The 2011 Standard of Good Practice released by the Information Security Forum provides clear guidance to businesses on IT security
VMware Based Protection For Virtualised Computing Environments
Latest product from BitDefender designed specifically for providing protection to virtualised environments running VMware
Evidence Based Security Protection Now More Important
IT security experts warn that existing detection methods based on anti-virus software, firewalls and intruder detection are insufficient to detect the majority of attacks
Heavy Consequences For NHS Data Loss
Secureworks comments on the NHS Data Loss reccommending a holistic view of IT security including data loss prevention to avoid such losses
UK Council Adopts Secure Mobile Working Regime
Becrypt trusted client enables the UK Borough Council of Newcastle-under-Lyme to provide it's mobile workers with secure VPN access as well as improved capabilities for disaster recover
On-Demand Cloud Based Anti-Spam Protection
Virtual appliance from SpamTitan enables anti-spam and anti-virus technology to be delivered on-demand using private cloud computing services
Integralis Attends E-Crime Cloud and Virtualisation Security Forum
Presentation on building a strong security system in a cloud computing environment to be delivered by Integralis executive at Cloud and Virtualisation event in the UK
Cloud Adoption Study Reveals Common Implementation Bottlenecks
Study from McAfee and Brocade into North American adoption of virtualisation and cloud computing reveals policy inconsistency, security loopholes and traffic bottlenecks as the most common inhibitors
Fortinet Protection Technology Services SFR Busines Clients
Telecommunications operator selects FortiGate and FortiClient appliances for unified network security for its managed services
InfoSecurity Europe Survey Uncovers Office Worker Knowledge Of Latest Tech-Speak
Commuting office worker survey uncovers lack of knowledge of cloud computing, smart phone security and other IT security terminology and trends
EuroCACS Conference Takes Place In Manchester
Taking the mystery out of cloud computing security to be the theme of this year's EuroCACS conference run by ISACA and to be held in Manchester later in March
Joint Event To Be Hosted By Redstor On Cloud Storage And Backup
The Belfry in Birmingham will be the venue next week for the Cloud Storage and backup event to be run jointly between Redstor and EMC
Scalable Cryptography Management Platform
Cryptosoft has released an encryption service platform that can be scalably deployed across a variety of environments including cloud, virtual or on-premises configurations
Securing Personal Laptops For Business Use
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com