Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Application security testing drives strong annual growth
Internet Security and Content Filtering : 04 August, 2008
Double the orders for 2007 drive outstanding growth for Fortify, consolidating its position in the market of Business Assurance software
National DNA database represents only a part of Government data security issues
Data Protection : 04 August, 2008
InfoSecurity Europe online forum reveals data privacy issues are not as high with the national DNA database than with other databases which hold more useful information for data thieves
Core Impact now provides testing for a broader scope of businesses
Network Security, Routers and Data Centres : 04 August, 2008
In two variants, Impact Pro and Essential are able to provide a security testing environment that covers all computing environments for businesses of any size
Teneros distribution partnership takes hold of European business continuity market
Backup, Data Recovery and Disaster Recovery : 01 August, 2008
Reseller recruitment and training programme underway for Europe as Teneros enters the market for e-mail back up and business continuity systems
Internet Security Suite trial to be bundled on Toshiba laptops
Anti-virus and anti-malware software : 01 August, 2008
Laptops from Toshiba on the EMEA small business and consumer market to be bundled with free 30 day trial of McAfee’s Internet Security Suite
Parental tips for controlling summer internet activity of school-free children
Internet Security and Content Filtering : 01 August, 2008
With a staggering 84% of parents relying only on verbal agreements with their children for safe use of the internet, BroadBandChoices offers some practical advice for preventing children on holiday from becoming internet victims
Unified Threat Management from phion M range
Data Protection : 01 August, 2008
Product range from phion targets medium sized businesses requiring centralised IT security management with UTM
DLP acquisition for McAfee
Data Protection : 01 August, 2008
Reconnex purchase by McAfee signals the IT security giant’s venture into the data discovery and data loss prevention markets
Secure information system business acquisition
Data Protection : 01 August, 2008
Northgate buys into information security for government and public sector businesses with the acquisition of Anite Public Sector Holdings
Aladdin strengthens authentication range with acquisition
Data Protection : 31 July, 2008
Secure SafeWord added to Aladdin's portfolio after purchasing the strong authentication product line from Secure Computing
Effective data protection monitoring
Data Protection : 31 July, 2008
Geoff Sweeney of Tier 3 examines the monitoring of an organisation's data protection measures in the context of new UK legislation
Protection against DNS cache poisoning
Internet Security and Content Filtering : 31 July, 2008
Integralis develops 3 step protection against DNS cache poisoning preventing hackers from circumventing security measures and redirecting browsers to malicious sites
FAST urges ISPs to do more to prevent illegal file sharing
Software Rights Management : 31 July, 2008
Letters from ISPs to users warning them of illegal file sharing activities is only the first step in preventing copyright infringements explains the Federation Against Software Theft
Network access control at educational campus
Network Security, Routers and Data Centres : 31 July, 2008
CounterACT is providing effective IT security and network access control at a Californian community college
Worldwide threat statistics released by Network Box
Anti-virus and anti-malware software : 31 July, 2008
A quarter of all viruses originate from America according to threat statistical analysis performed by Network Box
Anti-spyware for Trader Media Group
Anti-virus and anti-malware software : 31 July, 2008
Centralised management and effective resistance to spyware enables Trader Media Group to maintain a secure IT environment and reduce help desk call loading
Continued growth for PGP through 2nd Quarter
Data Protection : 31 July, 2008
IT encryption specialists achieve continued growth in revenues for the 24th quarter consecutively as sales continue to strengthen
RSA interoperability for whole disk encryption product
Data Protection : 31 July, 2008
PGP certifies whole disk encryption product as compatible with SecurID SID800 and joins RSA Secured Partner Programme.
Digital asset management for streaming media provider
Software Asset Management and Compliance : 31 July, 2008
Partnership between Daydream and Wowza brings digital asset management to the world of streaming media
Lords overturns hacker appeal against extradition
Data Protection : 30 July, 2008
A hacker who broke into NASA computers has had his application against extradition to the United States turned down and will now continue his fight in the European courts
Malicious software table reflects Olympic medal forecast
Anti-virus and anti-malware software : 30 July, 2008
Although the USA, China and Germany are top of the forecast table for Beijing Olympics medals, their superiority is also reflected in the awards for the top three malware host countries.
Security administration simplified at Welsh Council
Network Security, Routers and Data Centres : 30 July, 2008
By deploying Eventia Suite, Denbighshire County Council are able to save time and costs associated with security management across its networks
DES hires for UK market development
Data Protection : 30 July, 2008
Business Development Manager to exploit the UK channel market for DESlock+ for end point protection
Quota based filtering to control employee Olympic viewing times
Internet Security and Content Filtering : 30 July, 2008
With time based internet filtering available from the 8e6 R3000 filter, employers can now control the amount of time employees spend on certain internet activities
Bandwidth capping drives greater WiFi security
Network Security, Routers and Data Centres : 30 July, 2008
With ISPs likely to put fair usage policies in place in Britain, many companies can no longer afford to allow freeloaders access to their bandwidth according to GSS
Gartner recognition for Cyberoam UTM
Data Protection : 30 July, 2008
Innovative unified threat management solution from Cyberoam gains recognition in the Multifunctional firewall report from Gartner for small and medium sized businesses
Professional Services Head joins Achiever
Software Asset Management and Compliance : 30 July, 2008
New hire at Achiever Business Solutions to head up division responsible for training and consultancy for Governance, Risk and Compliance
WorkLight encourages banks to take up Web 2.0 technology
Finance and Banking Security : 30 July, 2008
Web 2.0 for wholesale banking is the way forward according to recent analysis and should be adopted by leading banks, says WorkLight
Pick up zero day phishing attacks in real time
Finance and Banking Security : 30 July, 2008
PhishLock from SentryBay enables e-commerce web site operators to provide real time protection for their customers from zero day phishing attacks
Bloxx urges child protection from the darker side of the web
Internet Security and Content Filtering : 29 July, 2008
Continued reports of attempted abuse of children using internet technology reinforces message to parents to become more aware of their children's online activities and methods of accessing the internet
PC Pro recognition for InstaGate
Anti-virus and anti-malware software : 29 July, 2008
Security appliance for small and medium sized enterprises receives praise from review team at PC Pro magazine
ArcSight chooses Wick Hill for UK distribution
Software Asset Management and Compliance : 29 July, 2008
Compliance and security event management software from ArcSight to be distributed in the UK by Wick Hill
PCI DSS certification for Sourcefire 3D system
Network Security, Routers and Data Centres : 29 July, 2008
Network intrusion prevention system from Sourcefire receives certification from the Payment Card Industry DSS
Celebrity lure directs browsers to malware sites
Anti-virus and anti-malware software : 29 July, 2008
Britney Spears and Obama e-mails contain links to malicious web sites where browsers are likely to fall victim to malware infections warns BitDefender
Activity monitoring and blocking for SQL environments
Data Protection : 29 July, 2008
Virtual platform support for SQL database security management available from Secerno
Fortify 360 now identifies vulnerabilities in SOA frameworks
Data Protection : 29 July, 2008
Protection extended for Fortify 360 customers as vulnerabilities in web services and SOA configurations are now revealed by the software
Automated data back up for laptop computers
Backup, Data Recovery and Disaster Recovery : 29 July, 2008
Mobile backup capability announced for laptop users which can be deployed over any internet connection
Sophos bids to take over Utimaco Safeware
Data Protection : 28 July, 2008
Bid to buy shares in Utimaco Safeware signals Sophos’ thrust into the data protection and end user threat management sectors of IT security
2Q sees increase in use of Universities and ISPs as zombies
Anti-virus and anti-malware software : 28 July, 2008
Report on 2Q IT threat activities indicates trustworthy domains being targeted for use as zombies for relaying spam and malware
Secure VPN client for mobile devices
Mobile computing security : 28 July, 2008
IPSec VPN client from NCP Engineering for mobile devices running Symbian operating system
Young LSO musicians protected by Bloxx
Internet Security and Content Filtering : 28 July, 2008
Innovative TVT-100 web filtering technology by Bloxx in use by the London Symphony Orchestra to provide safer surfing for its younger musicians
Perimeter defence for wireless networks
Network Security, Routers and Data Centres : 28 July, 2008
Car park attack on wireless networks are a thing of the past with RF barrier which prevents unauthorized entry from outside the perimeter
Computer tracing software tracks stolen laptops globally
Mobile computing security : 25 July, 2008
The rise in high profile laptop losses prompts Absolute Software to declare that existing data protection methods aren't enough and that tracking stolen devices adds additional protection and greater possibility of recovery
Contract extension to support government connect programme
Network Security, Routers and Data Centres : 25 July, 2008
Security advisers from Vega Group to support innovative technology development programme within the UK Government to provide improved communication between departments
A worm in a VW Golf ÃÂÃâ€ÂÃâÅ" the blended threat analogy
Anti-virus and anti-malware software : 25 July, 2008
Calum MacLeod provides some insight into blended threats and how they affect us all
e-banking not as secure as it could be
Finance and Banking Security : 25 July, 2008
GrIDsure examines APACS report on online banking and identifies remaining areas of insecurity in terms of user authentication
Behavioural analysis as a way of overcoming banking fraud
Finance and Banking Security : 24 July, 2008
Increased sophistication in e-banking fraud methods drives additional requirement for innovative methods of preventing losses including the use of behavioural analysis methods
American post offices get desk top PIN payment systems
Finance and Banking Security : 24 July, 2008
Vx610 Wireless payment systems equipped with PIN entry to be used for customer counters in US post offices
Web 2.0 security challenges to be addressed at forum
Internet Security and Content Filtering : 23 July, 2008
Securing the enterprise in an environment which benefits from web 2.0 technology to be held by WorkLight
Detailed insight into UK card fraud industry
Anti Fraud software : 23 July, 2008
The 3rd Man and reveal the results of their study into the extent and nature of credit card fraud in the UK
First | Prev  | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo