Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
IT Security
Proactive social media management on web filter
Internet Security and Content Filtering : 01 October, 2014
The latest version of the Bloxx web filter and secure web gateway enables more proactive management of social media as well as access to flash games
 
ControlFabric interoperability demonstrations at it-sa event
Network Security, Routers and Data Centres : 01 October, 2014
ForeScout will be at the it-sa event in Nuremberg to demonstrate its latest interoperability capabilities with other security systems based on the ControlFabric platform.
 
Cloud based security services for m-commerce
Mobile computing security : 30 September, 2014
Secure mCommerce available for app developers entering into the mobile based cloud payment systems market for mobile wallets
 
UK distribution agreement for anti-virus software
Anti-virus and anti-malware software : 29 September, 2014
Ingram Micro will supply BullGuard's antivirus and mobile security software in the UK as part of a new distribution agreement
 
Plain language PSN connectivity white paper
Data Protection : 29 September, 2014
McAfee is making it easy for companies needing to connect to the Public Services Network (PSN) in the UK through a plain language white paper
 
Shellshock protection for Check Point Software
Anti-virus and anti-malware software : 29 September, 2014
Users of Check Point Software products gain protection against Shellshock vulnerability after company issues IPS protection
 
When is a vulnerability not a vulnerability?
Software Asset Management and Compliance : 29 September, 2014
Mark Kedgley, CTO of New Net Technologies provides information on a continuous approach to vulnerability scoring and management
 
Technology partnerships extended to boost data security
Data Protection : 25 September, 2014
The Cipher Technology Partner Programme run by SafeNet now has further membership extending its reach and providing greater opportunities for data protection
 
German gas supplier protects network with 2FA
Authentication : 24 September, 2014
Two-factor authentication technology from SecurEnvoy is protecting the corporate network of German gas supplier, Primagas
 
Privacy concerns uncovered as barrier to mobility
Mobile computing security : 23 September, 2014
AdaptiveMobile reports on the concerns of employees for their privacy as well as a lack of trust as barriers to mobility
 
Apple device management in the cloud
Data Protection : 23 September, 2014
The Centrify User Suite now includes the Mac 2014.1 component to manage and secure Mac and iOS more efficiently
 
Back-up strategies and ensuring that they work
Backup, Data Recovery and Disaster Recovery : 23 September, 2014
Christian Toon of Iron Mountain discusses the options available to IT administrators for providing effective data back up and recovery
 
How to keep contactless payment credentials secure
Data Protection : 22 September, 2014
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
 
Four year outlook on DDoS prevention market
Anti-virus and anti-malware software : 22 September, 2014
Key vendors involved in Distributed Denial of Service prevention examined in new market research report predicting market volume over next four years
 
Alternatives to password protection for secure authentication
Authentication : 18 September, 2014
Securenvoy explains the two-factor authentication alternative available to the inadequate and outdated technology of password
 
Flawless detection rate in unknown attack testing
Anti-virus and anti-malware software : 18 September, 2014
Benchmark testing using unknown malicious files gives Check Point Threat Prevention highest mark in protection against internet attacks
 
Hybrid DDoS Defence for cloud and on-premises environments
Anti-virus and anti-malware software : 18 September, 2014
Arbor Networks improves its CloudSM and Pravail protection systems for hybrid DDoS either in the cloud or on company premises
 
The importance of strong authentication in the cloud
Authentication : 18 September, 2014
David Hald of SMS Passcode explains the way that cloud environments benefit from using strong authentication technologies rather than outdated passwords for security
 
Cyber threat programme assessment and development
Data Protection : 15 September, 2014
Rapid7 is now offering programme development services for cyber security through its Global Strategic Services Practice
 
Cloud based identity and access management for Samsung
Authentication : 15 September, 2014
The identity and access management feature on Samsung's enterprise mobility management cloud based service enabled by Centrify
 
A new perspective on antivirus solutions
Anti-virus and anti-malware software : 15 September, 2014
Panda Security explains how antivirus software is evolving to provide advanced protection in the current IT security environment
 
Cloud service provider takes DDOS protection platform
Anti-virus and anti-malware software : 11 September, 2014
The Arbor Peakflow SP platform is protecting iomart cloud services from distributed denial of service attacks
 
Integration improves mitigation and response times
Data Protection : 11 September, 2014
UserInsight from Rapid7 now operates in conjunction with HP ArcSight ESM providing faster and more effective threat mitigation
 
Latest breach shows retail industry to be prime cyber attack target
Data Protection : 10 September, 2014
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
 
Four reasons why tape based data storage isn't dead
Backup, Data Recovery and Disaster Recovery : 10 September, 2014
Christian Toon, the head of information risk at Iron Mountain explains how tape is still being used as a data storage medium
 
High mobile operator uptake of security software
Mobile computing security : 09 September, 2014
The top nine mobile operators are protecting their subscriber base with mobile security protection from AdaptiveMobile
 
Affordable Cyber Security Accreditation for Public Sector suppliers
Software Asset Management and Compliance : 09 September, 2014
The SME segment of the UK's public sector supply chain gains affordable cyber security accreditation from HP enterprise services
 
ForeScout expands presence in EMEA region
Network Security, Routers and Data Centres : 09 September, 2014
Increased demand in Europe for network security and continuous monitoring and mitigation leads to expanded presence in the region for ForeScout Technologies
 
Policy mapping ability for UTM and firewalls
Network Security, Routers and Data Centres : 09 September, 2014
WatchGuard is now able to provide the ability for IT security administrators to inspect policy configurations across unified threat management and NG-Firewall appliances
 
Linux malware linked to DDoS attack campaigns
Anti-virus and anti-malware software : 08 September, 2014
Akamai has released a threat advisory covering high-risk Linux system infections that can be used to launch DDoS attack campaigns
 
Single-sign-on company acquisition
Authentication : 08 September, 2014
LogMeIn expands its authentication product portfolio with the acquisition of single-sign-on and access management company, Meldium
 
All In One Security plug-in for Wordpress vulnerability
Anti-virus and anti-malware software : 08 September, 2014
High-Tech Bridge explains threat of new vulnerability affecting the All-in-one security plug-in for Wordpress
 
Data recovery from Apple logical failures
Backup, Data Recovery and Disaster Recovery : 04 September, 2014
Kroll Ontrack has developed a means of recovering lost data from Apple mobile devices after they have suffered a logical failure
 
Technology partnerships extend reach of cloud data controls
Cloud Computing Security : 04 September, 2014
The Box system from CipherCloud is being made available to more users through a technology partnerhip the company has entered into with Oris4 and mxHero
 
Nine DDoS Assumptions That Must Be Put to Bed
Anti-virus and anti-malware software : 04 September, 2014
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
 
Using secure enterprise workspaces in BYOD environments
Data Protection : 03 September, 2014
Dell SecureWorks provides five compelling reasons for deploying secure enterprise workspaces in BYOD environments in a balanced approach to secure business operations
 
10% of finance workers try to circumvent security
Authentication : 03 September, 2014
IS Decisions reveals the extent of insider threats in the finance industry with large numbers of employees admitting to deliberate insecure practices
 
Distribution partnership extends IT security reach into Russia
Network Security, Routers and Data Centres : 03 September, 2014
New Net Technologies is focusing on the Russian and CIS markets in a new distribution partnership set up with IT Guard
 
Public cryptography to protect Nigerian digital identity
Data encryption : 02 September, 2014
Cryptovision is supplying the PKI to support the deployment of electronic identity cards for 160 million citizens in Nigeria
 
Potentially Unwanted Programs rise to prominence in second quarter
Anti-virus and anti-malware software : 02 September, 2014
Report from Panda Security shows constant high levels of malware generation and the rise of Potentially Unwanted Programs
 
Risk management event to explore balance between opportunity and security
Data Protection : 02 September, 2014
Security strategy director at NTT Com Security to present on shedding old style constraints at the Gartner Security and Risk Management summit in London
 
Password security key to preventing online data being compromised
Authentication : 02 September, 2014
Security industry expertise points to insecure passwords being partly responsible for the private photos of people being compromised
 
Survey reveals extent of European cloud data storage acceptance
Cloud Computing Security : 28 August, 2014
Nearly half of EU companies still retain certain types of data on servers with continuing caution being shown for moving their data to the cloud
 
Secure login credentials using QR Codes
Authentication : 28 August, 2014
Verizon has developed a system whereby registered users can apply for a QR Code for use as a secure login credential with or without secondary credentials liks PINs or passwords.
 
Trojan delivery exploits Ukrainian political situation
Anti-virus and anti-malware software : 27 August, 2014
Hackers are using spam exploiting anti-western feelings in Russia to deliver malicious code for further spreading malware
 
Russian mobile operator protects subscribers from spam
Mobile computing security : 22 August, 2014
Cloudmark is providing Beeline mobile users in Russia with protection against spam, phishing and malware attacks
 
Additional security for Android Wear Watch owners
Mobile computing security : 22 August, 2014
Smart wearable technology gets the secure treatment with the available of mobile security and antivirus specifically for the wearable market from Bitdefender
 
IP reputation service integrated with security intelligence platform
Data Protection : 22 August, 2014
The BrightCloud IP reputation service from Webroot is being used for providing threat intelligence input to the security intelligence platform from LogRhythm
 
Home entertainment system vulnerabilities
Anti-virus and anti-malware software : 22 August, 2014
Experiment at Kaspersky Lab reveals the extent to which home entertainment systems lack security features exposing their users to unnecessary vulnerabilities
 
Survey illustrates risks to social network users
Anti-virus and anti-malware software : 20 August, 2014
Complacency towards personal security is still widespread amongst social network users according to results of a new survey
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com