Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
IT Security
Comprehensive security suite for networks
Network Security, Routers and Data Centres : 22 April, 2008
McAfee releases network protection suite with content security and threat management functions already built in.
 
Security for high performance networks
Network Security, Routers and Data Centres : 22 April, 2008
M-8000 and Content Security Blade Server deliver 10Gbyte network security without loss in network performance.
 
Enterprise encryption trend survey for the UK
Data Protection : 22 April, 2008
Ponemon survey indicates increased adoption of data encryption within UK organisations with nearly half expecting to adopt the technology throughout the enterprise within 2008.
 
Safe web 2.0 business collaboration white paper
Internet Security and Content Filtering : 22 April, 2008
The Jericho Forum user policy group has released a white paper dealing with the subject of Collaboration Oriented Architectures.
 
Integrated compliance and security delivered through a browser.
Software Asset Management and Compliance : 21 April, 2008
Qualys launches QualysGuard Security and Compliance suite as Security as a Service delivered through the web browser.
 
Unique approach to web filtering brings success for Bloxx.
Internet Security and Content Filtering : 21 April, 2008
With a three year growth of 700%, Bloxx is celebrating the meteoric success of its Tru-View Technology as web filtering technology that offers performance beyond that of traditional solutions.
 
Asian distributor signed for C2C
Anti-virus and anti-malware software : 21 April, 2008
Enterprise messaging and e-mail security reaches south east Asia with the signing of a new distribution partner for C2C.
 
Screening processes can reveal true customer identities.
Anti Fraud software : 21 April, 2008
Known terrorists, criminals and unidentifiable individuals found in survey of client data by anti-money laundering specialist Datanomic, proving that many companies often have no idea who they are dealing with.
 
Experienced endpoint security professional joins Protegrity.
Data Protection : 21 April, 2008
Protegrity strengthens its team of professionals with the appointment of Senior Vice President of Sales
 
Tier-3 identifies latest security vulnerability.
Anti-virus and anti-malware software : 21 April, 2008
Null pointer security flaws provide vulnerability for hackers to exploit as other routes become blocked.
 
UK Management strengthened at AVG.
Internet Security and Content Filtering : 21 April, 2008
Key Marketing and Sales appointments strengthen AVG's development of the UK market for its internet security software.
 
Ipswitch strengthens file transfer division with Standard Networks acquisition.
Data Protection : 21 April, 2008
Secure file transfer now available under one roof whatever the market sector after Ipswitch supplements its WS_FTP product with MOVEit from Standard Networks' portfolio after acquisition.
 
Gartner recognition for Sophos NAC product.
Network Security, Routers and Data Centres : 18 April, 2008
Report from Gartner provides positive rating for Sophos' Endpoint Security and Control network access control product.
 
Remote access gateway on show at InfoSecurity Europe.
Network Security, Routers and Data Centres : 18 April, 2008
Secure VPN and 3G routers with remote access security to form the core of Billion's exhibits at this years InfoSec exhibition.
 
Remote workers more likely to visit questionable web sites.
Internet Security and Content Filtering : 18 April, 2008
Web request scans by ScanSafe reveals that workers on the road are twice as likely as their office based colleagues to visit illegal web pages or sites with dubious or questionable content.
 
FAST calls on ISPÃÂÃâ€ÂÃâ€Âs to step up to their responsibilities for illegal file shares.
Software Rights Management : 18 April, 2008
The Federation Against Software Theft re-inforces its demands for self regulation in the internet service provision industry by taking more responsibility for acting against users breaking copyright laws.
 
TransWatch anti money laundering software launched.
Anti Fraud software : 18 April, 2008
By monitoring financial transactions, TransWatch from Complinet is able to detect and flag suspicious activity and resolve more cases of money laundering.
 
Five main threats to data on medical patients highlighted.
Mobile computing security : 18 April, 2008
Laptop protection is paramount in the healthcare industry according to Absolute Software who reveal the five most significant threat to the sensitive data they contain.
 
Application vulnerability exposes public data.
Internet Security and Content Filtering : 18 April, 2008
The US State of Oklahoma has been the victim of SQL injection vulnerability allowing thousands of its resident's data to become exposed.
 
419 scams hit social network sites.
Anti Fraud software : 18 April, 2008
The old Nigerian 419 scam inviting e-mail recipients to take part in money-laundering activities has now migrated onto the LinkedIn social networking site.
 
Senior executive spear phishing fraud uncovered.
Anti Fraud software : 18 April, 2008
Convincing E-mails of a legal nature target company executives with Trojan embedded.
 
Dell co-hosts computer recycling event for Earth Day.
Secure Waste Disposal and Recycling of IT equipment : 18 April, 2008
Computer users in Washington can take part in computer recycling awareness event held in the city on Earth Day.
 
Blade server based message processing and security products.
Internet Security and Content Filtering : 18 April, 2008
High end e-mail message controllers from sendmail support green data centre initiatives and cater for demanding security requirements.
 
Anonymising proxy loophole closed off by 8e6 Technologies.
Internet Security and Content Filtering : 18 April, 2008
Web filtering software from 8e6 Technologies uses intelligent pattern recognition software to prevent the use of anonymous proxies to bypass web filters.
 
Unified communications network for South Yorkshire Police
Network Security, Routers and Data Centres : 18 April, 2008
HiPath 8000 from Siemens enables police force in South Yorkshire to transform to IP telephony and integrate its communications infrastructure.
 
Software protection supplier moves to seat of the code-breakers
Data Protection : 18 April, 2008
WIBU Systems moves offices to Bletchley Park, the historic home of the 2nd world war code breakers and Enigma machine.
 
Single system for data encryption and destruction.
Data Protection : 17 April, 2008
OpenCentral from Virtuity provides API links into third party encryption software to enable full data control.
 
Claims Tested Mark certification for Mobile Guardian Enterprise.
Mobile computing security : 17 April, 2008
Government quality accreditation achieved by Mobile Guardian Enterprise after extensive testing.
 
TSANet alliance membership for SteelEye Technologies.
Network Security, Routers and Data Centres : 17 April, 2008
Multi-vendor implementations now a possibility for SteelEye Technologies through membership of the TSANet alliance.
 
Two weeks free IM and web usage reporting
Internet Security and Content Filtering : 16 April, 2008
Visitors to InfoSec offered the opportunity of trying RTDiscover network visibility tool on two week free trial and win an exceptional dining experience with FaceTime's ÃâÅ"Real Time Challenge".
 
Endpoint and perimeter protection from malware white paper.
Network Security, Routers and Data Centres : 16 April, 2008
Essential business IT security tips included in white paper from Webroot on malware protection at the end points and network perimeter.
 
Hand held DUET payment system for assistant and client.
Payment cards and e-commerce security : 16 April, 2008
Card reader supports all card formats, PIN entry and mobile phone based payments and has flexible usage for either hand-held or cradle mounted applications.
 
Vulnerability Management for Dummies guide available from Qualys.
Data Protection : 16 April, 2008
IT network vulnerabilities explained clearly in ÃâÅ"dummy" guide available from Qualys' stand at Infosecurity Europe and online.
 
Quarterly spam relay report from Sophos.
Anti-virus and anti-malware software : 16 April, 2008
Sophos report on spam expansion and relaying countries discovers spam-sites created somewhere in the world every 3 seconds.
 
Educational establishments choose Point-Click Recovery for data protection.
Backup, Data Recovery and Disaster Recovery : 16 April, 2008
SonaSafe Point-Click Recovery used in schools and universities to provide disaster recovery protection for Microsoft's server, SQL and exchange platforms.
 
Remote VPN access enabled with FW-100 appliance.
Network Security, Routers and Data Centres : 16 April, 2008
VPN firewall enables secure remote office location connection to central system with centralised administration.
 
E-banking losses through unsecured computer could be liability of user.
Finance and Banking Security : 16 April, 2008
Banking code report brings to light the intention of banks to make users liable for losses incurred through e-banking if the computer doesn't have adequate protection.
 
Public recognition for mobile security software
Backup, Data Recovery and Disaster Recovery : 15 April, 2008
Mobile and web security appliances from Trend Micro pick up bronze award from publication reader choice.
 
500 free e-mail archiving guides available at InfoSec.
Backup, Data Recovery and Disaster Recovery : 15 April, 2008
Mimosa backs up e-mail archiving expertise at the InfoSecurity Europe show by supplying 500 visitors with free copies of ÃâÅ"E-mail Archiving for Dummies".
 
Corporate data vulnerability testing.
Data Protection : 15 April, 2008
Core Security Technologies examines the risks associated with corporate data loss and emphasises the need not only to implement preventive measures but also to test that they are effective.
 
Reader recognition for software development product.
Data Protection : 15 April, 2008
SC Magazine readers select SCA 5.0 from Fortify as the best product for developing secure code.
 
Shoulder surfing a recognised problem for technology journalists.
Mobile computing security : 15 April, 2008
Survey of commuting journalists by 3M reveals the need for laptop privacy filters to prevent fellow passengers from reading across their shoulders.
 
50 percent revenue surge for Sendmail.
Anti-virus and anti-malware software : 15 April, 2008
Sendmail enters European market on the wave of outstanding results for the 2007 financial year.
 
WhatsUp Gold network management for Bolton Wanderers.
Network Security, Routers and Data Centres : 15 April, 2008
Network diagnostics and management software from Ipswitch installed on 400 port network run by Bolton Wanderers football club.
 
Security training needed for corporate network users.
Network Security, Routers and Data Centres : 14 April, 2008
According to dns, companies are providing too much access to inexperienced users and thus fuelling the risk of compromising corporate data.
 
Trend Micro founder in influential people list.
Anti-virus and anti-malware software : 14 April, 2008
Co-Founder of network protection specialists, Trend Micro, gains recognition as one of the most influential people in the IT industry.
 
Risks involved in transferring large data files.
Data Protection : 14 April, 2008
Restricting e-mail size drives employees to using web 2.0 or third party web sites to transfer large files, a risky prospect according to DVS Soft.
 
Endpoint encryption through IT adminstration console.
Mobile computing security : 14 April, 2008
Integration between Mobile Guardian and Altiris enables endpoint encryption tasks to be performed through a management console.
 
Transaction monitoring isnÃÂÃâ€ÂÃâ€Ât enough to prevent serious fraud.
Anti Fraud software : 14 April, 2008
Pro-active screening is a more effective way of preventing money laundering in the banking industry than the reactive approach of transaction monitoring according to Datanomic.
 
MEP rejection of anti-piracy measures criticized by FAST
Software Rights Management : 14 April, 2008
Proposal to ban file sharing software pirates from the internet has been rejected in the European Parliament as being in conflict with civil liberties.
 
First | Prev  | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com