Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
High capacity firewall appliance protects e-mail marketing company
Network Security, Routers and Data Centres : 27 November, 2014
An e-mail marketing company in Turkey has provided rule based network security with a high capacity firewall appliance supplied by Clavister
 
Advanced DDoS mitigation included in threat protection system
Network Security, Routers and Data Centres : 27 November, 2014
The latest release of the Thunder threat protection system from A10 Networks includes advanced DDoS mitigation capabilities and programmable policy engine
 
Encryption company celebrates a decade of success
Data encryption : 27 November, 2014
Zertificon is celebrating a decade of supplying central encryption gateways for corporate environments
 
Integrated network and content security
Network Security, Routers and Data Centres : 25 November, 2014
Barracude Security Suite provides integrated firewall, web filter and spam firewall within a single hardware appliance
 
Anatomy of the malicious Regin platform
Anti-virus and anti-malware software : 25 November, 2014
Kaspersky Lab provides some insight into Regin, established malware which attacks GSM networks with espionage campaigns
 
New firewall and UTM designed for growth in encrypted traffic
Network Security, Routers and Data Centres : 25 November, 2014
WatchGuard's latest firewall and unified threat management appliances have been designed to cope with the increased levels of encrypted traffic expected across corporate networks
 
ProtectV allows service providers to supply on-demand encryption for cloud storage
Data encryption : 25 November, 2014
With ProtectV technology, users of cloud storage products will be able to make use of encryption-as-a-service from their provider to increase the security of their data
 
Third quarter malware figures beat all records
Anti-virus and anti-malware software : 25 November, 2014
20 million + samples of malware were identified during the 3rd quarter with trojans being the most common type by far at over 78% of infections
 
UK and USA to collaborate on joint cyber crime initiative
Data Protection : 24 November, 2014
Cyber police exchange scheme could represent the start of a new approach in the fight against international cyber crime
 
Sandbox analysis report acclaims advanced threat prevention product
Anti-virus and anti-malware software : 24 November, 2014
Miercom tests Next Generation Threat protection and cloud based threat emulation service from Check Point with positive results
 
Security policy orchestration for multiple platforms
Data Protection : 24 November, 2014
Tufin adds Amazon web services support to its security policy orchestration suite providing centralised security policy management across platforms
 
UK troops advised to leave personal devices at home
Data Protection : 24 November, 2014
Fears of hacking have resulted in British troops being advised not to take personal computing equipment with them when deployed on exercises
 
Compromised privileged accounts key to advanced targeted attacks
Data Protection : 21 November, 2014
Study by CyberArk identifies privileged accounts as being central to the latest wave of advanced targeted attacks
 
Data recovery expert lists some of the lighter duties performed this year
Backup, Data Recovery and Disaster Recovery : 21 November, 2014
From dog-chewed USB sticks to drenched smartphones and an aggressive laptop user, Kroll Ontrack has helped them all recover data in 2014
 
Advice for securing vulnerable webcams
Data Protection : 21 November, 2014
Kaspersky Lab provides advice on preventing webcam snooping after website discovered which streams unprotected footage
 
Impact of allowing personal browsing on company computers
Internet Security and Content Filtering : 21 November, 2014
GFI Software research reveals the extent of the problem of allowing company employees to have unrestricted internet access on corporate devices
 
Facebook supercar scam could lead to identity theft
Anti-virus and anti-malware software : 21 November, 2014
Bitdefender is warning Facebook users of the dangers of scams involving false competitions and like-farming such as the recent Audi R8 false competition
 
Disaster recovery as a service partnership
Backup, Data Recovery and Disaster Recovery : 20 November, 2014
HP Enterprise Services and Symantec have agreed on a joint system for Disaster Recovery as-a-service for HP Helion OpenStack
 
Mobile networks provide opportunity for secure authentication
Authentication : 20 November, 2014
SecurEnvoy white paper describes the secure authentication options available for mobile device users
 
Managed security service for early threat detection
Data Protection : 20 November, 2014
Global threat intelligence at centre of portfolio of managed security services for early threat detection by Verizon
 
Application optimisation and security for SaaS providers
Internet Security and Content Filtering : 20 November, 2014
Web Performance Solutions product from Akamai is available for Software-as-a-Service providers to improve web application optimisation and security
 
Water authority improves IT network protection
Network Security, Routers and Data Centres : 20 November, 2014
ControlFabric architecture from ForeScout provides Sutton and East Surrey Water with integrated network and endpoint protection
 
The EU cyber taskforce should only be the beginning
Data Protection : 19 November, 2014
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
 
Top IT security predictions for 2015
Data Protection : 19 November, 2014
Websense has predicted the cybersecurity arena for 2015 with healthcare, the internet of things and credit card users top of the list of attack targets
 
UK retailer protects point-of-sale terminals across its network
Payment cards and e-commerce security : 19 November, 2014
Sysec is providing UK retailer, W H Smith, with protection for its network of point-of-sale terminals using McAfee Security Connected products
 
IT industry security award for log management
Software Asset Management and Compliance : 18 November, 2014
StormAgent log management and file integrity software receives commendation in the UK's IT Industry awards
 
Two-Factor Authentication promotion in Asia
Authentication : 18 November, 2014
SecurEnvoy is partnering with Infinite Data to bring advanced tokenless two-factor authentication technology into the vulnerable Asian region
 
Partnership brings PCI DSS compliance to Nigeria
Software Asset Management and Compliance : 18 November, 2014
NNT has partnered with Infoprive for the distribution of IT security and PCI DSS compliance software in the Nigerian market
 
Contactless sticker enables mobile payments
Mobile computing security : 14 November, 2014
New Zealand financial institution takes Optelio contactless stickers to enable secure payments using mobile phones
 
Free tool for removing unsolicited browser add-ons
Anti-virus and anti-malware software : 14 November, 2014
Unwanted adverts, toolbars and browser add-ons can now be simply eliminated with a new tool available from BitDefender
 
Corporate data security trust restoration
Data Protection : 14 November, 2014
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security
 
Research reveals extent of DDoS attacks on online service companies
Anti-virus and anti-malware software : 13 November, 2014
More than a third of public-facing online companies have become victims of DDoS attacks during the last year
 
Use the Power of the Pyramid to Protect Critical Data
Data Protection : 13 November, 2014
Steve Martino, Chief Information Security Officer, Vice President, Information Security at Cisco explains the prioritization requirements of data protection
 
Interoperability alliance strengthens access and threat management
Network Security, Routers and Data Centres : 13 November, 2014
ForeScout and Palo Alto Networks have integrated their products to offer greater threat management and network resource access control based on the ControlFabric platform
 
Only half of UK critical business data secured
Data Protection : 13 November, 2014
Research from NTT Com Security reveals extent of insecure data and lack of insurance within the structure of UK companies
 
ISP launches DDoS mitigation service
Anti-virus and anti-malware software : 13 November, 2014
ISP Vibe Communication is providing its customers with a DDoS mitigation service powered by NSFOCUS
 
Office worker survey shows high levels of complacency over data loss
Data Protection : 12 November, 2014
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
 
Web filtering for managed service providers
Internet Security and Content Filtering : 12 November, 2014
The Bloxx web filtering and security product is now available for use by Managed Security Service Providers
 
Corporate data protection on mobile devices
Mobile computing security : 12 November, 2014
Webroot SecureAnywhere provides increased malicious app and risky mobile behaviour visibility for the protection of corporate data
 
Travelling executives warned of Darkhotel threat
Anti-virus and anti-malware software : 11 November, 2014
Highly targeted cyber espionage techniques are being used against commercial travellers with highly valuable information warns Kaspersky Lab
 
Application delivery controllers balance loads at insurance provider
Network Security, Routers and Data Centres : 10 November, 2014
Data centres at Endsleigh Insurance are benefiting from the use of Application Delivery Controllers from A10 Networks
 
Avoiding the pitfalls of authentication based IT security
Authentication : 10 November, 2014
David Hald, co-founder and chief relation officer, SMS PASSCODE provides a step-by-step guide to understanding the common pitfalls of authentication-based security
 
Collaboration group to investigate connected vehicle security
Data Protection : 10 November, 2014
Intercede is part of a new collaborative group of industry partners examining the security implications of the emerging technology of connected vehicles
 
Cyber insurance goes hand in hand with good practices
Data Protection : 10 November, 2014
LogRhythm comments on the UK cyber-insurance market study and the need to combine insurance cover with good practices in protecting IT assets
 
Interactive incident timeline speeds up investigations
Data Protection : 07 November, 2014
The UserInsight behaviour analytics software from Rapid7 now features interactive incident timeline for faster investigation capability
 
SIEM and privileged threat analytics integration
Authentication : 07 November, 2014
CyberArk has integrated its Privileged Threat Analytics with the Enterprise Security Manager SIEM product from McAfee
 
Swiss IT security company acquisition
Internet Security and Content Filtering : 05 November, 2014
NTT Com Security further expands its presence in Europe with the acquisition of Swiss IT security company, InfoTrust
 
Advanced integrated internet security software
Internet Security and Content Filtering : 05 November, 2014
BullGuard introduces next generation software for internet protection including unwanted app protection functions
 
Wordpress fixes plug-in vulnerability
Internet Security and Content Filtering : 05 November, 2014
A vulnerability in the LiveSupporti WordPress plug-in has been fixed after Check Point raises the issue with the CMS supplier
 
Seamless business data security on mobile devices
Mobile computing security : 30 October, 2014
Check Point has developed the Capsule product for use on mobile devices to ensure commercial data security in BYOD programmes
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo