Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Intelligent approach to change detection
Data Protection : 03 September, 2015
Latest version of NNT Change Tracker provides more intelligence in system integrity monitoring and change tracking to prevent security breaches
 
IT security analytics products released at conference
Data Protection : 03 September, 2015
HP has released new products at the HP Protect event focused on shifting the emphasis of IT security towards an analytics approach
 
Secure data centre for Belgian Bank
Network Security, Routers and Data Centres : 03 September, 2015
Delen Private Bank in Belgium has chosen ICTroom to supply its secure corporate data centre in Antwerp
 
Online identity risks overwhelm UK consumers
Data Protection : 03 September, 2015
Study from Kaspersky Lab reveals privacy paralysis in the UK with consumers feeling overwhelmed with IT security risks
 
Channel Reseller News recognition for ForeScout CEO
Network Security, Routers and Data Centres : 03 September, 2015
Mike DeCesare named in top 100 executive list in Channel Reseller News rankings for 2015
 
Media players vulnerable to arbitrary code execution
Anti-virus and anti-malware software : 01 September, 2015
Bitdefender is warning of a vulnerability in JetAudio Basic and JetVideo media players that could result in remote code execution by attackers
 
Security breach impact on virtual infrastructure
Data Protection : 01 September, 2015
Report shows companies running virtual infrastructures suffer higher costs resulting from security breaches
 
File sharing security for logistics company
Network Security, Routers and Data Centres : 01 September, 2015
Varonis has provided a German logistics company with DatAdvantage to manage file permissions and security groups
 
August 2015 threat report available
Anti-virus and anti-malware software : 01 September, 2015
McAfee Labs has made the latest threat report available reviewing the way hardware and software threats have evolved over the last five years.
 
Young people lack trust in digital security
Data Protection : 27 August, 2015
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
 
Agentless protection for Windows 10 BYOD devices
Network Security, Routers and Data Centres : 27 August, 2015
CounterACT provides security professionals with the tools needed to cope with the deluge of Windows 10 BYOD device network connections
 
Survey shows increase in targeted attacks
Data Protection : 19 August, 2015
A survey conducted by Tripwire at Black Hat USA gauges the feelings of IT security professionals on the potential for nation-state cyber attacks
 
SMS based 2FA password reset service
Authentication : 19 August, 2015
Identity management service provider chooses SMS PASSCODE for performing password reset functions using two factor authentication to reduce help desk burden
 
Partnership for mobile wallet payments
Finance and Banking Security : 18 August, 2015
MeaWallet has gone into partnership to provide cloud based mobile payments for EMV card holders
 
Endpoint security software for businesses running Macs
Anti-virus and anti-malware software : 18 August, 2015
The Endpoint Security for Mac product from Kaspersky lab provides single console management for Mac oriented businesses
 
The silent approach of advanced persistent threats
Data Protection : 17 August, 2015
High Tech Bridge explains how easily advanced persistent threats infiltrate the IT network of an organisation exposing vulnerabilities
 
Multiple mac device security
Anti-virus and anti-malware software : 17 August, 2015
Flextivity 1.5 provides cloud based security and monitoring for small businesses operating Mac equipment
 
Business centre operator upgrades firewalls
Network Security, Routers and Data Centres : 14 August, 2015
Network infrastructure at Regus has been improved with next generation firewalls for secure remote access
 
Fake Windows 10 upgrade hides ransomware
Anti-virus and anti-malware software : 10 August, 2015
Bitdefender issues warning of ransonware spread through fake e-mails which solicit users to upgrade to latest Windows operating system
 
Mobile threat protection for iOS and Android
Mobile computing security : 10 August, 2015
Users of Android and Apple mobile devices now have access to mobile security software for threat detection and resolution
 
Stopping the insider threat
Data Protection : 10 August, 2015
Francois Amigorena of IS Decisions asks if your organisation has the perfect insider threat programme
 
Behavioural anomoly detection with threat analytics
Data Protection : 10 August, 2015
Holistic Threat Analytics Suite provides endpoint visibility of advanced threat compromised accounts
 
Protection from malicious mobile apps
Mobile computing security : 10 August, 2015
Corporate defence software from Proofpoint provides organisations with protection against vulnerabilities on mobile smartphone devices
 
Effective archiving to avoid data swamps
Backup, Data Recovery and Disaster Recovery : 07 August, 2015
Eileen Sweeney, SVP and General Manager of Data Management at Iron Mountain examines how organisations can avoid drowning in a swamp of data with the use of effective archiving strategies
 
The IoT Botnets are Coming: Are You Prepared?
Data Protection : 07 August, 2015
Rishi Agarwal of NSFOCUS provides some insight into the security vulnerabilities associated with the Internet of Things and what is being done to prevent them from being exploited
 
Securing the IoT with the Help of Multi-Factor Authentication
Authentication : 30 July, 2015
David Hald of SMS PASSCODE explains how multi factor authentication can be used as a robust security measure for the Internet of Things
 
Integrated security software for Windows 10
Anti-virus and anti-malware software : 30 July, 2015
Bitdefender responds to Windows 10 release with revised security software which provides seamless integration with the new operating system from Microsoft
 
Who is Winning the Internet Security War?
Internet Security and Content Filtering : 30 July, 2015
New Net Technologies describes how a combination of tactics are required in order to stay ahead of cyber criminals
 
Marketing appointment completes top management line-up at ForeScout
Network Security, Routers and Data Centres : 21 July, 2015
ForeScout CEO, Michael DeCesare explains his thinking behind the powerful senior team recently appointed to lead the company into a market-led future.
 
Extended firewall connectivity on threat analysis software
Data Protection : 21 July, 2015
The latest version of BeyondInsight now covers improved connectivity with Palo Alto firewall data analysis capability
 
Identity defined security the next priority
Authentication : 20 July, 2015
Clare Rees of Ping Identity examines social media trends in IT security and why identity defines security should be the next priority.
 
Survey reveals internet romance dangers
Internet Security and Content Filtering : 17 July, 2015
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
 
Threat intelligence unit formed for mobile security
Mobile computing security : 17 July, 2015
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
 
Financial audit company offers web security services
Internet Security and Content Filtering : 17 July, 2015
Partnership with High Tech Bridge brings web application security services to clients of PriceWaterhouseCoopers of Switzerland.
 
Managed Internet of Things security service
Internet Security and Content Filtering : 17 July, 2015
IT security company steps into the IoT arena with a managed service to assist companies with the management of security of the internet of things.
 
Continued access to corporate data for ex-employees
Data Protection : 17 July, 2015
Survey by Centrify shows how common it is for former employees to continue to have access to corporate data after they have left the company.
 
Malware attacks target public sector
Anti-virus and anti-malware software : 22 June, 2015
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
 
High cost of data breaches for UK businesses
Anti-virus and anti-malware software : 22 June, 2015
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
 
Next generation firewall with web filtering for schools
Network Security, Routers and Data Centres : 22 June, 2015
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
 
Industry specialist joins ForeScout board of directors
Network Security, Routers and Data Centres : 22 June, 2015
Network threat mitigation company takes FireEye CEO on to its board of directors as vice chairman
 
Security policy change management automation
Software Asset Management and Compliance : 16 June, 2015
Latest security management suite from AlgoSec provides complete policy change management for AWS as well as on-premises environments
 
Multi-factor authentication for Orange cloud based applications
Authentication : 16 June, 2015
Orange Business Services will use the SafeNet multi-factor authentication service from Gemalto for customer corporate applications
 
Award success for Network Access Control platform
Network Security, Routers and Data Centres : 15 June, 2015
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
 
Software licence specialist joins fight against theft
Software Asset Management and Compliance : 10 June, 2015
Gemalto joins the Federation Against Software Theft to bring education to smaller companies on the subject of licensing and entitlement
 
Response profile assessment tool
Network Security, Routers and Data Centres : 10 June, 2015
A new tool is available from Arbor Networks for assessing incident response profiles for identifying and responding to cyber attacks
 
Hardware encrypted USB 3.0 hard drive
Data Protection : 10 June, 2015
Imation is now offering FIPS 140-2 Level 3 certified 256-bit hardware encryption on a USB 3.0 high capacity hard drive for secure storage
 
Vulnerability management and real time assessment partnership
Network Security, Routers and Data Centres : 10 June, 2015
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
 
Wireless represents highest vulnerability according to survey
Network Security, Routers and Data Centres : 08 June, 2015
Fortinet reveals the results of a survey it conducted in which IT decision makers state their belief that wireless networks represent their highest vulnerability
 
ICO reports fall short of real level of UK data breaches
Data Protection : 08 June, 2015
Data Protection Act breaches could be more than ten times the levels reported to the Information Commissioners Office in the country
 
Survey looks at password frustration
Data Protection : 08 June, 2015
Centrify conducts survey amongst security professionals on frustrations suffered as a result of not remembering passwords
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo