Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Award recognition for ForeScout channel partner
Network Security, Routers and Data Centres : 27 February, 2015
High revenue growth rates in 2014 for enterprise sales has earned the 2014 ForeScout EMEA Channel Partner Award for NTT Com Security
Research published on Security-as-a-Service for communication service providers
Network Security, Routers and Data Centres : 27 February, 2015
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients
Aggressive adware still being seen in Android apps
Mobile computing security : 27 February, 2015
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender
Preventable software failures plagued 2014
Data Protection : 25 February, 2015
SQS reviews 2014 with a list of the top software failures of the year and their impact, including the infamous Heartbleed bug
Host service provider strategies to defend against DDoS attacks
Anti-virus and anti-malware software : 25 February, 2015
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself
Comprehensive security for mobile operator signalling infrastructure
Network Security, Routers and Data Centres : 25 February, 2015
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks
Lessons learned from web mobile application vulnerabilities
Data Protection : 23 February, 2015
Adrian Beck of Veracode looks back at some of the main data breach incidents of 2014 and explains what could be done to prevent them
Device timer regulates offline use of endpoints
Network Security, Routers and Data Centres : 19 February, 2015
Absolute Computrace enables network administrators to set offline usage policies with a trace and freeze options for endpoints
Hardware encrypted flash drives now available as USB 3.0 devices
Data Protection : 19 February, 2015
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity
Eight reasons to deploy multi-factor authentication
Authentication : 19 February, 2015
David Hald of SMS Passcode provide compelling reasons why Multi-Factor Authentication should be implemented for greater security
Pre-infection threat detection acquisition
Anti-virus and anti-malware software : 19 February, 2015
Check Point goes to the next step of threat detection with the acquisition of a company which provides CPU-level malware prevention technology
Five steps to secure iterative software delivery
Data Protection : 18 February, 2015
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process
Cloud service for using Android trusted environment
Mobile computing security : 18 February, 2015
Android app developers requiring data protection against malware from other software loaded on devices can now make use of the MyTAM cloud service for employing on-device Trusted Execution Environment
Arabic cyber espionage aims at high profile targets in Middle East
Anti-virus and anti-malware software : 18 February, 2015
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region
Defending company assets against the latest onslaught of cyber attacks
Data Protection : 18 February, 2015
Kalyan Kumar of HCL Technologies looks at the best defence strategies that organisations can use to protect themselves from increasingly sophisticated and effective cyber threats
Hardware security modules provide clinical trial security
Data Protection : 18 February, 2015
Digital signing of documents associated with clinical trials is being protected with the use of nShield hardware security modules from Thales E-Security
Company enters collaboration for military cyber protection
Network Security, Routers and Data Centres : 16 February, 2015
Critical communications systems of military forces will gain enhanced protection through a partnership involving cyber security experts at Clavister
Could wearable technology pose a threat in the workplace?
Network Security, Routers and Data Centres : 16 February, 2015
Alessandro Porro of Ipswitch discusses the predicted increase in wearable technology and what this could mean to the cyber threat landscape in the workplace
Dutch DDoS event demonstrates economic asymmetry of cyber attacks
Data Protection : 16 February, 2015
Thales UK comments on the ability for low-cost IT tools to be used to create economic havoc in commercial and administrative organisations
A billion data records compromised during 2014
Anti-virus and anti-malware software : 16 February, 2015
The 2014 Breach Level Index from Gemalto shows an almost fifty percent increase in data breaches to over 1 billion compromised records
Adaptive threat protection from multiple sources
Anti-virus and anti-malware software : 16 February, 2015
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
Large contactless payment card deployment in South American universities
Finance and Banking Security : 12 February, 2015
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil
Device based two factor authentication
Authentication : 12 February, 2015
Authentication service from iovation uses known laptops and smartphones as a means of verifying user authentication
NAC distribution agreement extended to the UK
Network Security, Routers and Data Centres : 12 February, 2015
ForeScout has extended its value-added distribution agreement with Arrow to encompass the UK and Ireland as well as the DACH region
Securing digital identities amongst the Internet of Everything
Data Protection : 11 February, 2015
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
Cloud based mobile access partnership
Mobile computing security : 11 February, 2015
MeaWallet is partnering with Safe4 Security Group to bring cloud based mobile access control products and services to the Nordic Market
Roaming threat protection on mobile networks
Network Security, Routers and Data Centres : 11 February, 2015
GRX Security Gateway from Clavister enables mobile operators to protect against threats to GPRS roaming exchange networks
Controlled secure file sharing for university data
Network Security, Routers and Data Centres : 11 February, 2015
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
Continuous monitoring and mitigation protects European digital classified ads platform
Network Security, Routers and Data Centres : 11 February, 2015
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
Anthem attack demonstrates need for more than static defence
Data Protection : 09 February, 2015
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
Managed keys for customer control of cloud encryption
Data encryption : 09 February, 2015
Individual customized control over access to different elements of cloud data through encryption keys provides better business specific access control and management
Ghost vulnerability on legacy Linux platforms
Anti-virus and anti-malware software : 09 February, 2015
Veracode releases statistics on the vulnerability of Linux systems to the Ghost vulnerability providing remote control
Missing patch detection and vulnerability assessment scanning
Anti-virus and anti-malware software : 09 February, 2015
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches
Network security eBook examines UTM
Unified Threat Management : 06 February, 2015
WatchGuard Technologies has published an eBook to provide companies with information on how to use Unified Threat Management to future-proof their network security
Survey probes data security in education sector
Data encryption : 06 February, 2015
A study from iStorage shows that lack of encryption on portable storage devices is putting sensitive education sector data at risk from exposure
Security company examines online dating fraud
Data Protection : 06 February, 2015
iovation provides details of the latest trends in online dating fraud and what consumers and businesses need to look out for to identify potential scams
Malicious adware continues to plague Android apps
Mobile computing security : 06 February, 2015
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices
Firewall for VMware virtualised environments
Network Security, Routers and Data Centres : 06 February, 2015
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments
NG firewalls provide hockey fans with secure internet access
Network Security, Routers and Data Centres : 04 February, 2015
The Swedish Hockey League is using Clavister's security gateway to enable network segregation and give fans access to online services
Analyst portal provides improved decision making
Data Protection : 04 February, 2015
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making
Risk management with advanced threat analytics
Data Protection : 04 February, 2015
Management and analytics console provides IT security managers with advanced threat detection capability to identify data breach threats
Study charts enterprise cloud usage risks
Cloud Computing Security : 04 February, 2015
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
UK telecom company software ensures payment card compliance
Payment cards and e-commerce security : 04 February, 2015
BCH Digital ensures the compliance of its hosted telephone card payment service with the PCI DSS standard using software from New Net Technologies
Google data privacy policy re-write an example for all
Data Protection : 03 February, 2015
Sue Trombley of Iron Mountain explains the implications of the ICO's pressure on Google to re-write its data privacy policy
Network Access Control market report recognises ForeScout as having largest deployments
Network Security, Routers and Data Centres : 03 February, 2015
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Threat of increased untrusted certificate use
Anti-virus and anti-malware software : 02 February, 2015
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
Award recognition for anti-virus product
Anti-virus and anti-malware software : 02 February, 2015
AV-Comparatives have chosen Bitdefender for its product of the year title for the second year in succession
Beyond access control with next-generation NAC
Network Security, Routers and Data Centres : 02 February, 2015
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
The real consequences of a DDoS attack
Anti-virus and anti-malware software : 30 January, 2015
Kaspersky Lab explains how a DDoS attack can have serious financial and operational consequences on the target organisation
Central management and application control on new firewall
Network Security, Routers and Data Centres : 29 January, 2015
The latest addition to Clavister's Wolf series of firewall appliances provides full control and management for entry-level enterprise security
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo