Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
IT Security
Message handling and archiving for large organisations
Backup, Data Recovery and Disaster Recovery : 07 May, 2008
Message Archiver 850 and 950 from Barracuda provide message archiving and compliance for organisations with large numbers of users.
Centralised security management console from Riverbed
Network Security, Routers and Data Centres : 07 May, 2008
CMC v5 from Riverbed Technology offers centralised network management including policy based configuration management and centralised security control
Anti-card fraud alliance delivers improved IP verificaton
Payment cards and e-commerce security : 07 May, 2008
Ability to verify IP address and eliminate use of anonymising proxies during e-commerce transactions strengthens 192 Business Services' ability to combat card not present fraud
Assistance for compliance to identity theft regulations.
Data Protection : 06 May, 2008
CompliancePal updated with 23 key identity theft indicators to enable companies to assess their readiness for compliance to forthcoming US legislation on identity theft prevention.
Focus report on identity theft in Texas.
Data Protection : 06 May, 2008
Study from Identity Theft 911 examines the causes of higher than national average incidence of identity theft in the state of Texas.
Next generation network access technology blueprint
Network Security, Routers and Data Centres : 06 May, 2008
Roadmap from NCP Engineering establishes the next steps required in the development of network access technology.
Crimeserver hosts compromised data from top global businesses
Data Protection : 06 May, 2008
Finjan research uncovers unprotected log files containing sensitive data from some of the top businesses in the world.
Protection for compliance with imminent PCI requirements
Payment cards and e-commerce security : 06 May, 2008
Payment Card Industry standards must be met by the end of June through the protection of attacks against web based commercial applications.
SQL attacks on web applications continue to increase.
Internet Security and Content Filtering : 02 May, 2008
Fortify warns of the need for protection against malicious web site attacks that can compromise applications and expose sensitive data.
Complex security landscape at T-Mobile simplified with Arcsight ESM.
Software Asset Management and Compliance : 02 May, 2008
IT security management and regulatory compliance catered for at T-Mobile using enterprise software from Arcsight providing the necessary scalability to manage the company's large scale network.
Phishing attempt on Google AdWord users.
Anti Fraud software : 02 May, 2008
E-mail requesting Google AdWord account update information is a phish attack seeking to extract bank account details from users.
Threat analysis for April from McAfee
Anti-virus and anti-malware software : 02 May, 2008
Threat analysis report reveals top phishing scams, brands targeted and most prevalent internet threats during April.
Gaming Trojans hit Asian countries
Anti-virus and anti-malware software : 02 May, 2008
April threat report from Fortinet shows growth in malicious software aimed at the gaming community in the Asian market.
Benefits of secure Web 2.0 presented at Secure Enterprise Forum.
Internet Security and Content Filtering : 02 May, 2008
Marketing VP of Worklight attends Secure Enterprise 2.0 Forum to discuss the benefits of Web 2.0 technology operated in a secured environment within the enterprise.
Logica opts for full disk encryption from BeCrypt.
Data Protection : 02 May, 2008
Protection of sensitive data and secure access for remote workers lead Logica to decision on using BeCrypt range of products to protect its information assets.
Education and military domains targeted as spam relays
Anti-virus and anti-malware software : 01 May, 2008
Video files on .edu and .mil domains contain prompt for Media Player download that contains Trojan.
Content Security award for ScanSafe.
Anti-virus and anti-malware software : 01 May, 2008
SC Magazine awards security as a service provider with award in the category of best content security for its scanning and content control products.
Card not present forum launches on May day
Payment cards and e-commerce security : 01 May, 2008
The 3rd Man takes the next step in combating retail fraud by setting up the CNP forum is launched at the Retail Fraud show in London on May the 1st.
Partnership for browser based asset management
Software Asset Management and Compliance : 01 May, 2008
IT Asset Management becomes web enabled in partnership development initiative between Vector Networks and service providers.
Venture funding to expand market reach of WorkLight
Internet Security and Content Filtering : 01 May, 2008
Web 2.0 workplace security to take a leap forward with funding round secured by Worklight.
Compliance management product reaches TM award finals.
Software Asset Management and Compliance : 01 May, 2008
Policy based compliance management product from Intelliden chosen as finalist in best new management product category in the TeleManagement forum awards.
Finance industry abdication of fraud responsibility lacks support for customers.
Finance and Banking Security : 01 May, 2008
Online research reveals that shifting the onus of responsibility for fraud protection onto consumers by financial institutions is only workable with improved assistance in security IT assets.
Criminalisation of data loss spells trouble for careless e-mail users.
Data Protection : 01 May, 2008
Recent research by Sendmail reveals the high degree to which e-mail users expose data through lack of encryption or poor knowledge of company policies.
Spam anniversary sees increase in unwanted mobile spam
Mobile computing security : 01 May, 2008
Rise in mobile spam creates demand for software to protect mobile users from unwanted e-mail and phishing attacks.
On the 30th anniversary of spam, Sophos urges users not to click on spam links
Anti-virus and anti-malware software : 01 May, 2008
30 years after DEC marketing man spams academics, the phenomenon has grown to levels where 95 percent of all mails received are unwanted according to Sophos.
McAfee comment on Lords support for legal amendment.
Data Protection : 30 April, 2008
Criminalising the loss or release of confidential data supported by the peers in a bid to stem the loss of public personal data.
SecurityReview on demand for Tech Mahindra.
Internet Security and Content Filtering : 30 April, 2008
Penetration testing using Veracode technology enables Tech Mahindra to provide comprehensive application security services.
US army accreditation of NetCracker.
Network Security, Routers and Data Centres : 30 April, 2008
Enterprise Infrastructure Management product gains certification for use with US military organisations.
Free phishing prevention guide from Cronto
Finance and Banking Security : 30 April, 2008
Fraud related to internet banking is a complex and changing threat which Cronto is helping to clarify with free downloadable guide.
E-mail backup and archiving for Liverpool University.
Backup, Data Recovery and Disaster Recovery : 29 April, 2008
Protection of vital documents and attachments for University of Liverpool achieved including offsite access with the implementation of Archive One from C2C.
Double award win for SecurityReview from Veracode.
Internet Security and Content Filtering : 29 April, 2008
Application security testing solution from Veracode picks up awards for vulnerability assessment and technology innovation from SC Magazine.
Complinet positions itself for further growth after record quarterly earnings.
Software Asset Management and Compliance : 29 April, 2008
Investment activity, key product releases and improved distribution results in strong year end for Complinet with forecasts for further growth in 2008.
Spam campaign targets gaming community.
Anti-virus and anti-malware software : 29 April, 2008
PS3 and Grand Theft Auto IV competition invitations contain Trojan, capturing gaming enthusiasts unawares, warns ClearMyMail.
Recognition for Sourcefire CTO.
Data Protection : 29 April, 2008
Founder of Sourcefire named as one of top 100 influential people in the IT industry by eWeek.
Partnership for two factor authentication over VPNs
Network Security, Routers and Data Centres : 29 April, 2008
Aladdin and Juniper join forces to offer secure remote access over VPNs using Aladdin's eToken strong authentication solution.
Jail term for spyware using private investigators.
Anti-virus and anti-malware software : 29 April, 2008
PI agency who used spyware as an industrial espionage tool have received prison terms in Israel after illegally gaining access to competitive information using spyware technology.
Open AT Security Plug-in provides M2M communication protection
Network Security, Routers and Data Centres : 29 April, 2008
Plug-In prevents jamming of tracking signals and enables secure wireless communications within the enterprise
Law company protects its information assets with DeviceLock.
Data Protection : 28 April, 2008
Information protection for respected law firm enabled using DeviceLock for controlling access to USB ports, WiFi and other system endpoints.
Payment security guide available at VeriFone stand at Kiosk Europe.
Payment cards and e-commerce security : 28 April, 2008
Secure point of sale payment systems demonstrated at European event with information and advice available for all aspects of ensuring secure retail payments.
Secure EPOS network upgrade for Somerfield retail chain.
Payment cards and e-commerce security : 28 April, 2008
UK Supermarket chain, Somerfield to upgrade existing Ethernet network to take advantage of the security features of the ES-3148 managed switch for protecting EPOS transactions.
Web cam hacker faces charges in Canada.
Anti-virus and anti-malware software : 28 April, 2008
Sophos warns home users to unplug their web cams when not in use to prevent being spied upon by hackers who take control of them.
Scandinavian channel partnership for ArcSight
Software Asset Management and Compliance : 28 April, 2008
Swedish reseller to offer compliance and IT security expertise in the Scandinavian region as an approved partner of ArcSight.
Majority of businesses donÃÂÃâ€ÂÃâ€Ât use encryption on wireless networks.
Network Security, Routers and Data Centres : 25 April, 2008
Study by Network Box reveals that businesses are continuing to leave themselves exposed to data losses through not encrypting their wireless network transmissions.
Cool vendor accolade for GrIDsure
Internet Security and Content Filtering : 25 April, 2008
April Gartner report lists GrIDsure in line up of application security and authentication vendors.
Tru-View web filtering technology leads to phenomenal growth for Bloxx
Internet Security and Content Filtering : 25 April, 2008
Focus on technological development and improvements to web filtering technology have led to 700% growth over three years for Bloxx.
Simple and effective internet filtering for shipping agency
Internet Security and Content Filtering : 25 April, 2008
Easy to apply filtering policy and effective content based blocking enables Graypen to control employee online activity with ease.
Internet content protection at Scottish school
Internet Security and Content Filtering : 25 April, 2008
Glasgow school stays ahead of pupil's internet activities by deploying Bloxx Tru-View technology to prevent access to unsuitable web sites.
Preventing inappropriate site access by blocking anonymous proxies.
Internet Security and Content Filtering : 25 April, 2008
Fears over the use by employees or students of anonymous proxies to bypass web filters can now be allayed by the use of Bloxx Tru-View software for content filtering which blocks access to anonymous proxies.
Internet security from BitDefender to hit the UK high street.
Anti-virus and anti-malware software : 24 April, 2008
Distribution agreement with Focus Multimedia brings BitDefender technology within range of the domestic consumer.
Javascript injection attacks compromise high profile sites.
Internet Security and Content Filtering : 24 April, 2008
Infection of good reputation web-sites highlights the need for the right tools to protect against the growing number of sources of malicious code.
First | Prev  | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012