Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Marketing appointment completes top management line-up at ForeScout
Network Security, Routers and Data Centres : 21 July, 2015
ForeScout CEO, Michael DeCesare explains his thinking behind the powerful senior team recently appointed to lead the company into a market-led future.
 
Extended firewall connectivity on threat analysis software
Data Protection : 21 July, 2015
The latest version of BeyondInsight now covers improved connectivity with Palo Alto firewall data analysis capability
 
Identity defined security the next priority
Authentication : 20 July, 2015
Clare Rees of Ping Identity examines social media trends in IT security and why identity defines security should be the next priority.
 
Survey reveals internet romance dangers
Internet Security and Content Filtering : 17 July, 2015
BullGuard has been polling internet daters to uncover the true risks of providing too much personal and financial information to strangers.
 
Threat intelligence unit formed for mobile security
Mobile computing security : 17 July, 2015
Mobile security company AdaptiveMobile is sharing its expertise in best security practices as part of its newly formed Threat Intelligence Unit.
 
Financial audit company offers web security services
Internet Security and Content Filtering : 17 July, 2015
Partnership with High Tech Bridge brings web application security services to clients of PriceWaterhouseCoopers of Switzerland.
 
Managed Internet of Things security service
Internet Security and Content Filtering : 17 July, 2015
IT security company steps into the IoT arena with a managed service to assist companies with the management of security of the internet of things.
 
Continued access to corporate data for ex-employees
Data Protection : 17 July, 2015
Survey by Centrify shows how common it is for former employees to continue to have access to corporate data after they have left the company.
 
Malware attacks target public sector
Anti-virus and anti-malware software : 22 June, 2015
Research from NTT Com Security show the majority of malware attacks in the UK are targeting the public sector
 
High cost of data breaches for UK businesses
Anti-virus and anti-malware software : 22 June, 2015
The way UK businesses approach security product implementation needs rethinking, according to Sophos network security expert
 
Next generation firewall with web filtering for schools
Network Security, Routers and Data Centres : 22 June, 2015
Barracuda Networks is targeting the education sector with its latest Firewall product with web filtering to improve school cyber security
 
Industry specialist joins ForeScout board of directors
Network Security, Routers and Data Centres : 22 June, 2015
Network threat mitigation company takes FireEye CEO on to its board of directors as vice chairman
 
Security policy change management automation
Software Asset Management and Compliance : 16 June, 2015
Latest security management suite from AlgoSec provides complete policy change management for AWS as well as on-premises environments
 
Multi-factor authentication for Orange cloud based applications
Authentication : 16 June, 2015
Orange Business Services will use the SafeNet multi-factor authentication service from Gemalto for customer corporate applications
 
Award success for Network Access Control platform
Network Security, Routers and Data Centres : 15 June, 2015
CounterACT from ForeScout Technologies has been judged to be the best NAC solution in the SC Magazine awards this year
 
Software licence specialist joins fight against theft
Software Asset Management and Compliance : 10 June, 2015
Gemalto joins the Federation Against Software Theft to bring education to smaller companies on the subject of licensing and entitlement
 
Response profile assessment tool
Network Security, Routers and Data Centres : 10 June, 2015
A new tool is available from Arbor Networks for assessing incident response profiles for identifying and responding to cyber attacks
 
Hardware encrypted USB 3.0 hard drive
Data Protection : 10 June, 2015
Imation is now offering FIPS 140-2 Level 3 certified 256-bit hardware encryption on a USB 3.0 high capacity hard drive for secure storage
 
Vulnerability management and real time assessment partnership
Network Security, Routers and Data Centres : 10 June, 2015
ForeScout is extending its range or interoperability with a new partnership with vulnerability assessment specialist, Qualys
 
Wireless represents highest vulnerability according to survey
Network Security, Routers and Data Centres : 08 June, 2015
Fortinet reveals the results of a survey it conducted in which IT decision makers state their belief that wireless networks represent their highest vulnerability
 
ICO reports fall short of real level of UK data breaches
Data Protection : 08 June, 2015
Data Protection Act breaches could be more than ten times the levels reported to the Information Commissioners Office in the country
 
Survey looks at password frustration
Data Protection : 08 June, 2015
Centrify conducts survey amongst security professionals on frustrations suffered as a result of not remembering passwords
 
Cloud based real time content filtering
Internet Security and Content Filtering : 08 June, 2015
Bloxx is now offering its real time web content filtering products off the premises with Tru-View Cloud
 
Tokenization for protection of cloud data
Cloud Computing Security : 05 June, 2015
CipherCloud is now offering Next Generation Tokenization as an additional method of protecting data that resides in the cloud
 
Assessing cyber risk goes beyond counting vulnerabilities
Data Protection : 02 June, 2015
Matt Alderman, VP of Strategy at Tenable Network Security explains how organisations can improve their risk assessment and reduce vulnerabilities
 
Confidential e-mail encryption
Data encryption : 02 June, 2015
A belt and braces approach to secure e-mail with both password and certificate based encryption
 
Report analyses 1Q2015 IT security events
Data Protection : 02 June, 2015
Panda Security examines the IT security landscape during the first quarter of the year with trojans continuing to be the most common threat
 
Intelligent packet capture for improved incident response
Network Security, Routers and Data Centres : 02 June, 2015
Lancope is at the InfoSecurity event this week in London with its PacketWatch product for intelligent packet capture
 
IT security interoperability demos at Infosecurity Europe
Network Security, Routers and Data Centres : 02 June, 2015
ForeScout Technologies is attending Infosecurity Europe with demonstrations of ControlFabric based interoperability in conjunction with major partners
 
IRS hack exposes personally identifiable information
Anti-virus and anti-malware software : 01 June, 2015
Security company Sophos comments on the recent breach experienced by the US Inland Revenue Service exposing personal tax payer information
 
Access and mobile security expansion in Europe
Network Security, Routers and Data Centres : 29 May, 2015
Pulse Secure has its debut this year at the InfoSec Europe event as the company progresses its expansion into the EU region
 
Malicious iPhone attack messages blocked
Mobile computing security : 29 May, 2015
Over a million messages threatening to attack iPhone equipment in the USA have been blocked by mobile security software from AdaptiveMobile
 
SSD storage for industrial and commercial use
Data Protection : 27 May, 2015
The latest solid state drives from SanDisk can replace hard drives in many commercial and industrial embedded computing systems such as signage
 
Rationalising the network at large European print supplier
Backup, Data Recovery and Disaster Recovery : 27 May, 2015
Barracuda Networks has helped Papergraphics to rationalise its network over multiple remote locations to integrate backup, archiving and network security
 
Cloud based interactive application security testing
Internet Security and Content Filtering : 26 May, 2015
Partnership between Veracode and Contrast Security brings interactive application security testing into the cloud as an automated service
 
White paper illustrates how essential security is being overlooked
Network Security, Routers and Data Centres : 26 May, 2015
Swivel Secure investigates the vulnerability of corporate networks to cyber attacks with IT departments overlooking essential security measures
 
Aerospace company deploys secure VPN
Network Security, Routers and Data Centres : 26 May, 2015
France based Airbus subsidiary secures its international partner communications using virtual private network with VoIP capability from Interoute
 
Considerations for taking out cyber insurance
Internet Security and Content Filtering : 20 May, 2015
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums
 
Android protection for Korean mobile payment specialist
Finance and Banking Security : 20 May, 2015
Intercede has supplied Interpay with the MyTAM platform for providing payment security and malware protection for Android users of the mobile payment system
 
Protection of information from visual hacking
Data Protection : 20 May, 2015
Peter Harley of 3M explains how companies could be losing information through leaving screens exposed to people able to see content over the users shoulder
 
Skill shortage for information management
Data Protection : 20 May, 2015
Survey from Iron Mountain reveals the extent to which business leaders are facing a skills shortage in the UK for critical information management
 
BYOD risks overlooked by smaller businesses
Mobile computing security : 19 May, 2015
Research from Kaspersky Lab shows almost a third of small UK businesses fail to see any threat in employees using their own mobile devices
 
EU General Data Protection Regulation still misunderstood by many
Data Protection : 12 May, 2015
A survey at Counter Terror Expo has revealed the level of misunderstanding that still exists amongst UK businesses of the forthcoming EU General Data Protection Regulations
 
Security seal denotes manually pen tested sites
Internet Security and Content Filtering : 12 May, 2015
Web sites and applications which have been manually penetration tested can now be distinguished from other by the ImmuniWeb Security Seal
 
Key European sales appointments for data centre company
Network Security, Routers and Data Centres : 08 May, 2015
ICTroom hires bolsters European sales growth with two new appointments covering the UK, Ireland and the DACH region
 
Secure storage ready for Windows 10
Data encryption : 08 May, 2015
Windows 10 ready IronKey devices can now be configured and integrated in batches for easier deployment for secure enterprise storage
 
Chief Strategy Officer to lead new phase of growth
Network Security, Routers and Data Centres : 08 May, 2015
Network security company hires Chief Strategy Officer to provide leadership into the next growth stage in line with corporate strategy
 
Cloud authentication using NFC devices
Authentication : 06 May, 2015
ActivID Tap Authentication provides multi-factor credentialling for users of Microsot Office 365 and other cloud apps and services
 
Wristbands enable secure contactless payment
Payment cards and e-commerce security : 06 May, 2015
Rugby Union fans and guests of the Saracens can use contactless payments at their London stadium thanks to the use of secure wristbands
 
Web application scanning acquisition
Internet Security and Content Filtering : 06 May, 2015
Rapid7 takes over NT Objectives bringing latest web application scanning tools into the company portfolio
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo