Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
IT end of life management still critical a year after WEEE
Secure Waste Disposal and Recycling of IT equipment : 26 June, 2008
Tier 1 is increasing its co-operation with industry and IT companies for handling the environmental aspects of IT Asset Management
 
Browser based IT Asset Management
Software Asset Management and Compliance : 26 June, 2008
Vector Networks Issue Tracker enables web based IT asset management and issue tracking capability
 
Remote monitoring of staff IM activity
Internet Security and Content Filtering : 26 June, 2008
StaffCop 2.4 enables organisations of any size to monitor instant messaging traffic from corporate laptops
 
E-mail security policy white paper available
Anti-virus and anti-malware software : 26 June, 2008
Sophos has made its white paper on effective e-mail policies freely available as a download from their web site
 
New business continuity centre opens in California
Backup, Data Recovery and Disaster Recovery : 26 June, 2008
Quest offers full disaster recovery, business continuity and business resumption facilities with its new facility in McClellan, California
 
Handy advice for protecting laptops from theft
Mobile computing security : 25 June, 2008
Mobile security experts, Absolute Software, offer tips on prevention laptop theft from the office or when out on the road
 
Web application protection
Internet Security and Content Filtering : 25 June, 2008
ThreatSentry provides firewall and intrusion detection for IIS web applications
 
Duplicate payment protection from Fiscal Technologies
Anti Fraud software : 25 June, 2008
Duplicate Payment Finder reduces the risk of losses and fraud for users of accounts payable software
 
PCI compliant tax free shopping system
Payment cards and e-commerce security : 25 June, 2008
Integrated system for tax refund transactions which are secure and compliant with PCI DSS requirements jointly developed by The Logic Group and Global Refund
 
D-Link embeds Microsoft network security
Network Security, Routers and Data Centres : 25 June, 2008
Network Access Protection from Microsoft now available as part of the xStack switch range from D-Link for added network security
 
Fortify 360 users gain PCI compliance assistance
Payment cards and e-commerce security : 25 June, 2008
Vulnerabilities for Payment Card Industry compliance identified by Fortify 360 enabling problem remediation for users
 
Eutronsec purchase extends reach of Aladdin into Europe
Data Protection : 25 June, 2008
Aladdin has acquired authentication product provider Eutronsec to enable wider scope for marketing products in Europe
 
Assureon interoperability assurance with Symantec archiving products
Backup, Data Recovery and Disaster Recovery : 24 June, 2008
Secure data archiving and recovery solution from Nexsan qualified for use with Symantec's Enterprise Vault products
 
Partnership agreement between Sourcefire and MIS CDS
Data Protection : 24 June, 2008
MIS Corporate Defence Solutions joins Sourcefire partner program to distribute Sourcefire's 3D System within the UK
 
Internal network traffic protection from malicious traffic
Network Security, Routers and Data Centres : 24 June, 2008
Intrusion Prevention from Stonesoft provides protection for corporate networks from malicious code
 
Complex software trends create increased vulnerability
Anti-virus and anti-malware software : 24 June, 2008
Report on the complexity of enterprise software reveals an increased possibility of security flaws being present causing risk for inadequately protected businesses
 
Gold certification for AVG Technologies
Anti-virus and anti-malware software : 24 June, 2008
Achieving Microsoft Gold status delivers higher status to AVG Technologies and its popular anti virus products including the freely downloadable AVG Free
 
UK technical support manager recruited at BitDefender
Anti-virus and anti-malware software : 24 June, 2008
Expansion in support offering to both business and domestic users of BitDefender products drives additional UK appointment
 
EMEA VP recruitment reflects global market expansion for Protegrity
Data Protection : 24 June, 2008
New UK office for Protegrity to be led by VP for EMEA operations as the company drives its expansion into the European market
 
Acquisition expands e-mail archiving SaaS portfolio
Backup, Data Recovery and Disaster Recovery : 24 June, 2008
By acquiring Fortiva, Proofpoint gains additional weight in the market for delivering service for e-mail archiving and data loss prevention
 
Enterprise identity and access management system
Network Security, Routers and Data Centres : 24 June, 2008
Courion improves enterprise ability to control access and manage identity and thus meet increasing demands for compliance
 
Firewall requirement from PCI standard inadequate
Payment cards and e-commerce security : 23 June, 2008
PCI requirements coming into force at the end of June fail to address the significant problem of insider threats according to Secerno
 
Regulatory consultant joins ISI European office
Software Asset Management and Compliance : 23 June, 2008
New hire in the UK to oversee the implementation of compliance and regulatory projects for Image Solutions' growing European market
 
Four key patents granted for Fortinet
Network Security, Routers and Data Centres : 23 June, 2008
Multi-threat security provision and network virtualisation form the core of the technology for which Fortinet picks up patents
 
Facebook phishing campaigns demands tighter security
Internet Security and Content Filtering : 23 June, 2008
With recent reports of phishers stepping up their campaign on Facebook users, WorkLight recommends business users to reinforce security on web 2.0 applications in the workplace to prevent falling victim
 
Improvement in Gartner rating for Integralis
Anti-virus and anti-malware software : 23 June, 2008
Managed Security Services from Integralis rated strong positive by Gartner signifying an improvement on 2007
 
Asset management group complies to EU directive with dn:Director
Anti Fraud software : 23 June, 2008
PEP screening software from Datanomic enables asset management company to gain full compliance with European Money Laundering Directive
 
LinkedIn personnel changes section exposes companiestest
Data Protection : 23 June, 2008
Aladdin voices concerns over companies posting information about personnel changes on business networking sites such as LinkedIn
 
Exchange virtualisation to protect against e-mail down time
Backup, Data Recovery and Disaster Recovery : 23 June, 2008
Through joining the VMware technology alliance, Teneros expands its capability of deploying its MS Exchange virtualisation for the protection of enterprise e-mail resources
 
Network resource protection with intelligent switching
Network Security, Routers and Data Centres : 23 June, 2008
Survey by ConSentry Networks shows that legacy switching systems combined with lack of user controls result in indiscriminate access rights being granted.
 
Free white paper on creating web policies
Data Protection : 20 June, 2008
Sophos assists companies in creating employee internet usage policies by releasing a free downloadable white paper on the topic
 
Mac OS X Trojan download warning
Anti-virus and anti-malware software : 20 June, 2008
AppleScript.THT Trojan enables remote access to victim computer with transmission of passwords and capabilities for keylogging, warns SecureMac
 
McAfeeÃÂÃâ€ÂÃâ€Âs fantasy league team for attracting malicious code
Internet Security and Content Filtering : 19 June, 2008
Euro 2008 stars attract malicious sites with the players' names proving popular search terms driving victims to sites harbouring malware according to McAfee in its ÃâÅ"Malicious XI" list
 
Web based software asset management service
Software Asset Management and Compliance : 19 June, 2008
AppVelocity service available for UK companies for discovering software licenses on IT Networks to ensure conformance to licensing requirements
 
Web filter now able to block streaming video
Internet Security and Content Filtering : 19 June, 2008
R3000 internet content filtering from 8e6 technologies improved to enable the blocking of unwanted streaming video in the run up to a summer of high profile sporting occasions
 
itlab urges UK businesses to take a closer look at disaster recovery
Backup, Data Recovery and Disaster Recovery : 19 June, 2008
With communication infrastructure failures not uncommon to some UK businesses, itlab offers a full protection disaster recovery service
 
Fortinet remains ahead in unified threat management
Data Protection : 19 June, 2008
IDC research confirms Fortinet's leading position in UTM as a result of large scale FortiGate adoption in larger companies
 
IronPort protection for SME sector
Anti-virus and anti-malware software : 19 June, 2008
Collaboration with Comstor enables IronPort to bring enterprise standard virus and spam blocking technology to smaller businesses
 
Security management system certification for Interxion
Backup, Data Recovery and Disaster Recovery : 19 June, 2008
UK and Netherlands data centres achieve ISO 27001 security management systems certification
 
Unencrypted backup brings FSA wrath on stock broker
Finance and Banking Security : 19 June, 2008
Despite no security breaches having taken place, Stock broking firm Merchant Securities is fined by the FSA for having unencrypted back up tapes
 
Chinese earthquake warning spam contains link to malware
Anti-virus and anti-malware software : 19 June, 2008
Sophos warns of malware link to video file from spoof e-mail claiming Beijing earthquake puts Olympic games in jeopardy
 
Java beans and coffee beans donÃÂÃâ€ÂÃâ€Ât mix well on corporate networks
Network Security, Routers and Data Centres : 19 June, 2008
Australian report of network security flaws coming to light after hooking coffee percolator to the net demonstrates risk of unsecured passive network devices being connected to the internet
 
DLP leadership recognition for Websense
Data Protection : 19 June, 2008
Gartner has recognised Websense's role in data loss prevention by positioning them in the leaders quadrant
 
Sourcefire closes out latest MS vulnerabilities
Anti-virus and anti-malware software : 18 June, 2008
Vulnerability research team generates rules for protection in line with latest security bulletins issued by Microsoft
 
CAPS approval process underway for removable media encryption from BeCrypt
Data Protection : 18 June, 2008
Zero footprint, device based encryption software for removable media including USB devices goes through approvals process for FIPS 140-2
 
New CEO joins Sourcefire
Anti-virus and anti-malware software : 18 June, 2008
Ex Citrix senior executive to lead the board at Sourcefire and take the company into the next generation of enterprise security protection
 
Fortinet buys into database security
Data Protection : 18 June, 2008
Acquisition of IPLocks puts Fortinet in a strong position in the database security market
 
Lawyers conform to money laundering polices with Datanomic
Anti Fraud software : 18 June, 2008
By purchasing dn:Director from Datanomic, SJ Berwin lawyers are able to comply with European money laundering directives
 
EpiForce VM undergoes successful test by VeriTest
Network Security, Routers and Data Centres : 18 June, 2008
Ability to protect virtual servers alongside physical devices on one platform confirmed in performance and compatibility testing by VeriTest
 
Further call for stricter encryption after MP loses laptop
Data Protection : 18 June, 2008
Government hardware continues to go missing despite higher security measures and high uptake of security policies
 
First | Prev  | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo