Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Web 2.0
Web 2.0 refers to the second generation of web usage rather than any change in the technical specification of the internet. Web 2.0 is more of a social phenomenon than a technical one. These changes are reflected in two main areas: the delivery and use of application software entirely through the web browser and the use of social networking sites.
Effective archiving to avoid data swamps
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
Web application assessment available in open beta version
ImmuniWeb SaaS web application security assessment software for scanning and vulnerability assessment is openly available in beta
Integrated security protects IT infrastructure at UK zoo
Unified Threat Management system from WatchGuard Technologies is ensuring continued operation of the IT network infrastructure being used at Chester Zoo in the UK
Secure Web Gateway for complex infrastructures
Protection against malware and other threats available for complex IT infrastructures using Secure Web Gateway from Gateprotect
BYOD Protection With UTM Appliance
The WatchGuard XTM 5 brings Bring-Your-Own-Device protection into the realms of Unified Threat Management
Data Loss Prevention Across Distributed Network
Check Point is providing data loss protection to internation law company using R75 Software Blades
People Factor Forms Essential Part Of Next Generation Security Policies
Check Point details the human factor in planning for a successful corporate security policy for the future
Integrated Pattern Based Authentication For Web Applications
The GrIDsure Authentication Platform provides developers with a means of integrating strong pattern based authentication technology into their web-based applications
ISO 27001 Compliance Advice
IT Governance warns against IT Security complacency and believes that the ISO 27001 security management standard should be more globally embraced
Highly Automated Web Application Scanner
The QualysGuard web application scanning appliance provides automatic scanning of large numbers of web applications enabling full secure use of cloud computing
Providing Corporate IT Users With More Security Responsibility
Terry Greer-King of Check Point examines the security problem resulting from the consumerisation of IT in the workplace and suggests placing more responsibility on the user of such devices
Real-Time Protection Web Filtering For Web and App Publishing Network
Browser application built by Commtouch and Conduit alerts users to web based threats based on real-time, cloud based threat protection and URL filtering
Raising the Bar On Detecting And Preventing Malicious Code Attacks
Ray Bryant of Idappcom details the need and the methods of preventing malicious code attacks by hybridisation during a time when cyber criminals are becoming more sophisticated
Web Filtering Distribution Agreement For Benelux
Dutch IT Security Distribution specialist enters agreement with Bloxx for the distribution of Tru-View Technology in the Benelux region
WatchGuard Multi-Function Firewalls Available From Wick Hill
UK Software distributor now stocking the XTM family of firewalss from WatchGuard Technology
HP Defines Web Exploit Kits As Number 1 IT Risk
In HP's Top Cyber Security Risks Report, the most significant weapon being used in the world of cybercrime is the Web Exploit Toolkit
EEMA Joins Single Digital Identity Community
European e-Identity Association collaborates with the SSEDIC to drive the digital single market across Europe
Calculate the Cost Of Social Media Usage In The Workplace
SpamTitan is bringing easier tools to Human Resources departments with the release of its Social Media Cost Calculator to assess the cost impact of using social media in the workplace
Web Application Scanning Tool With Javascript and Flash Support
QualysGuard security-as-a-service now benefits from Web Application Scanning version 2.0 with support for JavaScript and Flash for detecting potentially vulnerable software flaws
Virtualisation Technology Features In New Security Service Platform
Cloud security applications delivered using a service model from Qualys have been unveiled at the RSA show
Additional Language Support Added To Tru-View Technology
Bloxx has catered for additional web-filtering capability within Tru-View Technology by incorporating categorisation capability for web-sites in the Spanish and German languages
Software Blad Based Network Security Suite
Check Point releases R75 bringing 3D security vision to network environments making use of the company's Software Blade Architecture
The User Role In Social Network Site Security
Amichi Shulman of Imperva comments on Social Networking security issues as part of Safer Internet Day
WatchGuard Details High Risk Social Media Applications
Business are under threat from the use of social media according to WatchGuard who goes through the most risky applications and how they can affect businesses through data loss and reduced productivity
Spam Levels Return To High Levels After 4Q Lull
Commtouch’s Internet Threats Trend Report highlights 45% increase in spam after reported reductions in the 4th quarter of last year
Automatic Web Protection From ProxyOne Hybrid Appliance
Blue Coat Systems reduces IT resource requirements with comprehensive hybrid appliance for coping with growing web-based threats including social media
Stakeholder Group Set Up In Europe For The EC's Digital Agenda For Europe
New working group to provide a roadmap for affected organisations to achieve the European vision for achieving a single digital community
Check Point Examines Security Approaches To The Year Ahead
Nick Lowe of Check Point peers deeply into the prediction for endpoint and data security trends of 2011 with particular emphasis on emerging threats
XTM Appliance From WatchGuard Provides Network Security For Telekom Deutschland Clients
Business Network Protect service from Deutsche Telecom makes use of unified threat management protection from WatchGuard
Human Factors Prevail In Data Loss Incidents
Alexei Lesnykh of DeviceLock puts recent data loss incidents and industry reports into perspective and suggests the human factor is predominant in the prevention of losses in an industry where IT has become consumerised and cyber-criminals are become more focused in their targets
Secure Service Platform Keeps Ex-Pat Moroccans In Touch With Home
WISeKey technology is keeping information used by Moroccans living abroad secure during the World Economic Forum
Bloxx Hits The Deloitte Fast 50 List
Web filtering company ranked 19th in Deloitte's list of the 50 fastest growth technology businesses in the UK
HTML Attachments Increase In Popularity For Malware Delivery Vehicle
The Third Quarter Trend Report from Commtouch highlights the increasing use of HTML attachments to e-mails as the delivery mechanism for malicious payloads
Zeus Malware Spreads To Smartphones and Social Networking Sites
Trusteer CEO provides some insight into the latest iteration of Zeus bringing problems to LinkedIn users as well as Smart phones
Web 2.0 Application Control Available
Check Point is tackling the problem of web 2.0 application security in the workplace with the release of an Application Control Software Blade to bring social networking widgets and applications under tighter security control and policy enforcement
Web 2.0 Application Security A Concern For UK Businesses
Business and IT professionals in the UK are unconvinced that employees take security risks into account when using web 2.0 applications in the workplace according to research from Check Point and the Ponemon Institute
Further iTune Hack Results In Call For Greater Password Security
Application based hack of the iTunes store comes as a further embarrassment for Apple and is a reminder to iTunes users of the need for strong password protection on their accounts
Multi-Stage Attacks Feature Highly In Q2 Internet Threat Report
Commtouch sees combination of vectors such as social engineering and spam increasingly being successful for cyber criminals as detailed in the company's internet threat report for the second quarter of 2010
Software-As-A-Service Web Protection and Filtering Service
Web Protection service from McAfee enables companies to gain scalable web filtering and protection with ease of reporting and policy enforcement
Advisory On Prevention Of Website Hijacking During World Cup Period
Fortinet provides information of the increased threats to corporate websites from hackers during the World Cup, an event providing cyber-criminals with increased opportunities for compromising companies and individuals through a variety of techniques
Web Gateway Sees Increased Protection at Version 7
Virtual appliance from McAfee provides improved protection from web-borne threats and from attacks from botnets
USB Malware Strikes High On McAfee Threat Report
McAfee's threat report covering the first quarter of 2010 reveals USB worm to be the top global threat
Social Networking Protection in The Workplace Not Enough, Says Survey
Although Smaller Businesses in America are aware of the importance of protecting against inappropriate use of social networking sites in the workplace, not enough is being done to filter such sites according to SpamTitan Research
Real Time Reputation Blocking Features In New Firewall From McAfee
The McAfee Firewall Enterprise Version 8 brings next generation functionality to network protection including improved visibility and policy enforcement
BitDefender to Exhibit Next Week at InfoSecurity Europe in the UK
Whilst attending major UK Information Security exhibition, BitDefender is raising its profile through education workshop participation
Magic Quadrant Placement For Check Point Enterprise Firewalls
Gartner recognizes Check Point Software Technologies for its success in the development and sales of Enterprise Network Firewalls
Bandwidth Control and Intrusion Prevention For UK University
Canterbury Christ Church University will use Palo Alto firewalls from Data Integration for safe Web 2.0 usage combining intrusion detection and prevention functionality with controls over bandwidth usag
High Speed Web Filtering With Additional Categorisation
SiteFilter 3.0 from eSoft offers zero-hour URL protection, real time categorization updates and microsecond rates of database lookup
The Development of Security Technology to Keep Pace with Web 2.0
Michael Shema of Qualys explains the challenging environment of Web 2.0 and how security applications need to keep pace as threats adapt to new ways that consumers are using the web
Multifunction Network and Internet Security On Show At Infosecurity Europe
WatchGuard Technologies is attending Infosecurity Europe in April displaying its eXtensible content security and threat management platforms including URL Filtering and web-blocking functions
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo