Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Further call for stricter encryption after MP loses laptop
Data Protection : 18 June, 2008
Government hardware continues to go missing despite higher security measures and high uptake of security policies
 
Anonymous surfing with CyberGhost VPN
Network Security, Routers and Data Centres : 18 June, 2008
Internet privacy assured through total anonymity for users of CyberGhost VPN
 
Traffic monitoring tool assists in detecting inappropriate internet usage
Internet Security and Content Filtering : 18 June, 2008
FirePlotter from GISS provides IT administrators with the ability to monitor excess traffic across Cisco and FortiNet firewalls
 
Free endpoint assessment results reveal a number of problems
Anti-virus and anti-malware software : 18 June, 2008
Failure to implement MS security patches, disabled firewals and out of date anti-virus software amongst the problems revealed by Sophos' free endpoint assessment test
 
Stolen data finds its way onto crimeware server
Data Protection : 18 June, 2008
Finjan discovers treasure trove of illegal data obtained from medical, airline and corporate databases being auctioned online
 
Remote data kill switch could prevent stolen laptop data loss
Mobile computing security : 18 June, 2008
Latest high profile loss of government laptop highlights need for measures to prevent sensitive data from falling into the wrong hands, something which can be achieved by remote data disabling
 
Linux support for HASP software rights management
Software Rights Management : 18 June, 2008
Software copyright protection tool from Aladdin now available for the Linux platform
 
AchieverPlus market extended with new partner
Software Asset Management and Compliance : 18 June, 2008
Market for government risk and compliance management product from Achiever now extended to the Middle East and the CIS through new distributor
 
Marketing executive joins Webroot
Internet Security and Content Filtering : 18 June, 2008
VP of Solutions Marketing to concentate on the development of the software as a service market for Webroot
 
Hospital laptop theft leaves patient data vulnerable
Data Protection : 18 June, 2008
Loss of 6 portable computers from London hospital puts sensitive data about patients at risk of being used for identity theft
 
Multiple laptop theft demonstrates physical security is not enough
Data Protection : 18 June, 2008
Locking portable computers in a secure cabinet proves inadequate as 6 laptops go missing from London hospital
 
Techworld product of the year for Core Impact
Network Security, Routers and Data Centres : 17 June, 2008
Security assurance testing product from Core Security Technologies picks up Software Security Product of the Year award at the Techworld Awards
 
Web 2.0 threat protection for Joy Global
Internet Security and Content Filtering : 17 June, 2008
Secure Web from Secure Computing protects mining equipment supplier from internet borne security threats
 
Senior academic forecasts severe internet limitations due to malicious code
Internet Security and Content Filtering : 17 June, 2008
Lumension Security proposes alternative approach to internet security to prevent the gloomy future recently forecast by leading academic
 
Heavy sentence for hacker deemed fair by Cyber-Ark
Anti-virus and anti-malware software : 17 June, 2008
Custodial sentence for Californian hacker reflects severity of the offence which brought down data records in large health clinic
 
InfoSecurity Europe Survey on UK trends published
Data Protection : 17 June, 2008
Bell Micro releases disturbing results of survey into UK business IT Security attitudes conducted at InfoSecurity Europe 2008 in London
 
Phion buys into network security with acquisition of Visonys
Network Security, Routers and Data Centres : 17 June, 2008
Phion strengthens growth potential in network security technology with the acquisition of Swiss IT security company, Visonys
 
Compliance award for Easy Enterprise
Software Asset Management and Compliance : 17 June, 2008
Enterprise compliance software, Easy Enterprise has gained a Storrie award for compliance product of the year
 
10Gig DdoS detection from Arbor threat management system
Network Security, Routers and Data Centres : 17 June, 2008
Arbor Networks breaks the 10 Gbyte barrier for detection, mitigation and protection from distributed denial of service attacks
 
Secure IT disposal experts help keep Earthrace afloat
Secure Waste Disposal and Recycling of IT equipment : 16 June, 2008
Replacement laptop delivered free of charge to biofuel powerboat control centre by company specialising in the ecological and secure disposal of IT equipment
 
Key distribution awards gained by Wick Hill
Anti-virus and anti-malware software : 16 June, 2008
Watchguard and Allot recognise Wick Hill distribution services with Distributor of the Year awards from both companies
 
ThreatPak gains data loss protection
Data Protection : 16 June, 2008
DLP, compliance and e-mail improvements to ThreatPak brings greater threat protection to e-mail protection package from eSoft
 
Industry award for web application firewall product
Internet Security and Content Filtering : 16 June, 2008
dotDefender from Applicure picks up Techworld award for the ability to centrally manage the security of web applications across multiple platforms
 
Bloxx web filtering employed at capital law company
Internet Security and Content Filtering : 16 June, 2008
Prince Evans law firm deploys Tru-View Technology in order to improve staff performance, block access to inappropriate web content and protect the companies network from malware
 
Corporate web 2.0 users warned over uncontrolled access
Internet Security and Content Filtering : 16 June, 2008
The benefits of deploying web 2.0 technology in a corporate environment requires a cautious approach to overcome the associated security issues
 
PCI compliance for CounterACT
Payment cards and e-commerce security : 16 June, 2008
Control of access to cardholder details enables CounterACT v6.3 to meet Payment Card Industry DSS requirements
 
Netfence provides high availability security for Antenne Bayern
Network Security, Routers and Data Centres : 13 June, 2008
German radio station ensures uninterrupted availability of its IT systems in support of its demanding infrastructure requirements with the use of netdefence from Phion
 
Successful hacker prosecution with the help of Sophos
Anti-virus and anti-malware software : 13 June, 2008
Sophos has assisted Computer Crime Division of Metropolitan Police in finding and convicting Florida hacker for botnet crimes
 
GrIDsure warns of fraud concerns over high speed banking transactions
Finance and Banking Security : 13 June, 2008
A new approach to authentication could solve problems associated with trends in performing higher value and faster banking transactions over the internet
 
Poupart secures supply chain systems with StoneGate
Anti-virus and anti-malware software : 13 June, 2008
Critical EDI and web messaging for supply chain continuity at fruit retailers secured with StoneGate Multi-link technology
 
Lexar USB devices secured with DeviceLock
Data Protection : 13 June, 2008
Collaboration between Lexar and DeviceLock brings data leakage prevention to USB flash drive
 
AdaptiveMobile calls for greater mobile content control
Internet Security and Content Filtering : 13 June, 2008
Parental control capabilities for mobile devices reduces the possibility of children being able to access inappropriate content
 
Hackers target recruitment sites for infecting visitors
Anti-virus and anti-malware software : 13 June, 2008
High level positions targetted by hackers to by gaining access to their computers through infecting recruitment agency web sites
 
Siemon survey ranks security as biggest issue in IT
Network Security, Routers and Data Centres : 13 June, 2008
Research amongst IT Management reveals that security is the largest concern along with issues of compliance to regulatory standards
 
Compliance management solution up for TMC award
Software Asset Management and Compliance : 12 June, 2008
Intelliden's policy based compliance management package accepted as nominee for communication solutions award
 
Roaming fraud detection solution enjoys widespread adoption
Mobile computing security : 12 June, 2008
The detection and prevention of roaming fraud becomes global with the majority of GSM network providers opting for MACH
 
XSS flaw problem needs to be urgently addressed
Internet Security and Content Filtering : 12 June, 2008
Fortify is calling on the IT security industry to make a consolidated attack on cross site scripting flaws before the problem becomes unmanageable
 
CitectSCADA patch to be urgently applied
Network Security, Routers and Data Centres : 12 June, 2008
Enterprise security experts Core Security Technologies advises all CitectSCADA users to apply the latest patch immediately to prevent their process control and industrial networks from being left open to compromise
 
Ngage Solutions chooses online business continuity from Interxion
Backup, Data Recovery and Disaster Recovery : 12 June, 2008
Secure data services from Interxion including the managed business continuity service of data back up and restoration has been chosen by Ngage Solutions
 
New CIO at PGP to drive global IT systems
Data Protection : 11 June, 2008
Experienced industry expert joins PGP as Chief Information Officer for the development of strategic IT resources in the company
 
Hackers strike at South African government
Anti-virus and anti-malware software : 11 June, 2008
In a syndicated malware attack in South Africa, hackers have been reported to have hauled millions from the country's government systems
 
Alliance provides Stonesoft with easier route to government contracts
Network Security, Routers and Data Centres : 11 June, 2008
Stonesoft and immixGroup have formed a partnership for the marketing of VPN security systems into government agencies in America
 
FortiGuard offers protection against ActiveX vulnerability
Internet Security and Content Filtering : 11 June, 2008
Fortinet Intrusion Prevention System foils parameter injection attempt, protecting users from malicious code on web sites
 
Web Security Gateway includes Web 2.0 protection
Internet Security and Content Filtering : 11 June, 2008
Real time protection against dynamic threat enables users of Web Security Gateway to deploy web 2.0 technologies in their organisations without suffering from the associated threats.
 
Lumension recommends rolling out latest patches immediately
Anti-virus and anti-malware software : 11 June, 2008
IT administrators shouldn't delay rolling out this month's patches from Microsoft which cover a mixture of vulnerabilities across different platforms
 
Getronics to market Cyber-Ark digital vaulting products
Data Protection : 11 June, 2008
Cyber-Ark Software signs worldwide partnership deal with Getronics gaining wider market penetration for managing sensitive data through digital vaulting
 
Additional laptop security features from OmniAccess 3500 NLG
Mobile computing security : 11 June, 2008
Corporate mobile workers gain additional protection for their laptops with the latest release of OmniAccess 3500 which now includes full disk encryption
 
Three phase power protection for data centres
Hardware protection and UPS : 11 June, 2008
Compact redundant power supply systems for data centres or other three phase applications now available with Smart-UPS VT from APC by Schneider Electric
 
Credit card address code check easily compromised
Anti Fraud software : 11 June, 2008
The 3rd Man identifies ease with which information stolen from customer databases can be exploited in credit card fraud
 
Microsoft Gold status for Achiever Business Solutions
Software Asset Management and Compliance : 11 June, 2008
Regulatory compliance and governance software experts achieve Microsoft Gold Certified Partner accreditation
 
First | Prev  | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo