Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Securing the future with multi-factor authentication
Authentication : 17 February, 2014
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
 
UK distribution partnership for two-factor authentication
Authentication : 17 February, 2014
SecurEnvoy has partnered with Infinigate for the distribution of two-factor authentication systems within the UK territory
 
Behavioural analysis and continuous monitoring deployment
Data Protection : 17 February, 2014
Navis has taken the IDS-6300 intelligent security appliance from DB Networks for behavioural analytics and coninuous monitoring
 
Unified multi-factor authentication platform
Authentication : 14 February, 2014
The S3 Authentication Suite provides centralised multi-factor authentication for operation with a wide range of devices
 
Threat response partnership formed
Data Protection : 14 February, 2014
Bit9 and Carbon Black have joined forces to deliver rapid threat response capabilities for the IT industry
 
Mobile services platform for NFC rollout
Payment cards and e-commerce security : 14 February, 2014
Gemalto is supporting the rollout of Near Field Communications for secure payments in the Far East
 
Poor anti-theft software implementation threat
Data encryption : 14 February, 2014
Kaspersky Lab provides details of the hidden threat overshadowing poor implementations of anti-theft software that can be exploited by attackers
 
Email Defense Suite protects cloud service users
Cloud Computing Security : 13 February, 2014
Intermedia is protecting its customers with enhanced cloud security provided by McAfee Email Defense Suite
 
Less than half of parents use internet supervision controls
Internet Security and Content Filtering : 13 February, 2014
Research by ESET demonstrates gap in internet child protection as parents neglect to use supervision controls
 
Complex cyber-espionage toolkit The Mask explained
Data encryption : 13 February, 2014
Kaspersky Lab provides details of "The Mask", an advanced cyber-espionage operation comprising different attack vectors for targeting high profile victims
 
Windows user security management tool
Authentication : 13 February, 2014
Security management system for Windows 8.1 and Server 2012 R2 provides full management of users, groups, shares and rights
 
Warning of new DDoS attack toolkit launch
Anti-virus and anti-malware software : 12 February, 2014
Prolexic is issuing a warning of the availability of the DNS Flooder v1.1 toolkit for use by hackers launching malicious attacks
 
Embedded virtual security appliance
Mobile computing security : 12 February, 2014
Innominate is attending Embedded World in Germany with its mGuard eVA embedded virtual security appliance
 
Multi-platform data encryption for widespread adoption
Data encryption : 12 February, 2014
Sophos is providing easier capabilities for enterprises to adopt widespread encryption with the launch of SafeGuard Encryption 6.1
 
Study shows increase in enterprise encryption levels
Data encryption : 12 February, 2014
Key management remains a challenge for organisations deploying enterprise-wide encryption, according to study from Ponemon and Thales e-Security
 
Focus returns to remote working during recent tube strike
Data encryption : 12 February, 2014
Recent industrial action on London's underground system prompts Raj Samani of McAfee to provide advice to companies of staying secure whilst employees work remotely
 
Cloud security and compliance acquisitions
Cloud Computing Security : 10 February, 2014
Imperva is acquiring Incapsula and Skyfence to extend the company's data centre security strategy across the cloud
 
Card fraud trends examined in research report
Payment cards and e-commerce security : 10 February, 2014
Javelin research report delves into consumer password habits and the relationship to payment card data fraud instances
 
Sochi visitors vulnerable to hacking
Anti-virus and anti-malware software : 10 February, 2014
SafeNet provides advice to Sochi visitors on how to prevent data loss to hackers in one of the hacking capitals of the world
 
Second light update released in February
Anti-virus and anti-malware software : 10 February, 2014
Microsoft's security updates remain light with two critical advisories and three labelled as important
 
Unsecured intimate content at risk on Valentine's day
Mobile computing security : 10 February, 2014
McAfee is warning against being too intimate in electronic communications in the run-up to valentine's day with almost a third of people not having any basic security in place on their smartphones
 
Mainframe security acquisition
Data Protection : 07 February, 2014
Imperva acquires z/OS mainframe security expertise from Tomium Software for integrated real-time monitoring
 
One-time QR code authentication
Authentication : 07 February, 2014
One Swipe technology from SecurEnvoy provides users with the ability to authenticate themselves using a one-time QR code
 
Network access control rated as highest cyberthreat defence
Network Security, Routers and Data Centres : 06 February, 2014
A report has been published on cyberthreat defences that rates network access control as having the highest potential for counteracting threats
 
Webinar explores data breach prevention for retailers
Data Protection : 06 February, 2014
Lancope is providing retailers with insight into protection from data breaches using network visibility improvements at two forthcoming webinars
 
Online banking security for Turkish bank
Finance and Banking Security : 06 February, 2014
Kobil is supplying Application Security Technology for the protection of online banking clients at A&T Bank in Turkey
 
Large fashion retailer gains PCI DSS compliance
Payment cards and e-commerce security : 06 February, 2014
The Jack Wills fashion retailer is securing over a million transactiosn per year compliant with PCI DSS regulations using New Net Technologies
 
Privileged identity management to integrate with CARM initiative
Data Protection : 04 February, 2014
Lieberman Software chooses Exclusive Network as first UK distribution partner for its privileged management software.
 
User-defined response to network threats
Network Security, Routers and Data Centres : 04 February, 2014
Incident responders do not have the luxury of time on their side. Security success relies on rapid identification, interpreation and response to the myriad attacks infiltrating corporate networks.
 
New Sales Director to strengthen profile in US Western Region
Authentication : 04 February, 2014
Following its US launch in 2012, Swivel Secure has strengthened its US profile by appointing Steve Maloney as Western Regional Sales Director located in Swivel's US HQ in Seattle, Washington.
 
Novell acquires source code for full disk encryption
Data encryption : 03 February, 2014
Secude International reaches agreement with Novell on acquisition of source code and development rights for ZENworks full disk encryption
 
Security analytics modules extended to cloud applications
Cloud Computing Security : 03 February, 2014
Three new modules from ExtraHop bring additional data analytics capabilities for security, WAN optimisation and cloud applications
 
Mindset change needed to overcome PoS vulnerability
Data encryption : 03 February, 2014
Thales e-Security comments on the RSA discovery of Eastern European malware which steals payment card data from retail point-of-sale equipment
 
Big data analytics for improved understanding of sensitive assets
Cloud Computing Security : 03 February, 2014
Research report shows the benefits of using metadata for the analysis of sensitive information in unstructured data
 
Romanian ransomware server brought down
Anti-virus and anti-malware software : 31 January, 2014
Bitdefender analysts examine ransomware server in Romania discovering over 10000 successful Trojan installs in the UK
 
Orchestrated network infrastructure management prediction
Network Security, Routers and Data Centres : 31 January, 2014
Tufin Technologies predicts the future of enterprise network security with a shift towards more orchestrated management of infrastructure
 
Malware study programme at California University
Anti-virus and anti-malware software : 31 January, 2014
Students at the University of California have undertaken a programme of study led by Trusteer on computer malware
 
Wiki site vulnerability discovered
Internet Security and Content Filtering : 31 January, 2014
Remote code execution discovery on Wiki platform patched on basis of recommendation by Check Point to prevent malware code injection
 
Non-OTP based authentication tool for web applications
Authentication : 31 January, 2014
Encap launches a hybrid authentication app for mobile users for securing web applications without the need for one-time passwords
 
Study shows cyberbullying risk for young teenagers
Internet Security and Content Filtering : 31 January, 2014
14-15 year old's online behaviour is putting them at increased risk of cyber-bullying, according to a study carried out for Safer Internet Day
 
Next generation firewall for remote locations
Network Security, Routers and Data Centres : 31 January, 2014
WAN optimisation and integrated content security feature on Barracuda's next-generation F280 Firewall for use in branch offices and remote locations
 
Comprehensive report on market for mobile device and network security
Network Security, Routers and Data Centres : 31 January, 2014
Mobile device and network security report provides details of expected market growth and segmentation covering the period to 2020
 
DDoS mitigation service with tenfold capacity
Anti-virus and anti-malware software : 30 January, 2014
Service for dealing with the consequences of Distributed Denial of Service (DDoS) attacks increases bandwidth and mitigation capacity
 
Privacy study reveals extent of access to private data on smartphones
Mobile computing security : 30 January, 2014
A study undertaken by Bitdefender shows the extent to which smartphone apps track user location and access personal information
 
BYOD management and network access control for Florida college
Network Security, Routers and Data Centres : 30 January, 2014
A liberal arts school in Florida is combining BYOD management with ease of use for its network users with CounterACT network access control
 
Insufficient staff training in IT security revealed
Anti-virus and anti-malware software : 29 January, 2014
PhishMe survey demonstrates lack of awareness of phishing and general IT security threats amongst UK office staff
 
Architecture for data centre security service delivery
Network Security, Routers and Data Centres : 29 January, 2014
The aCloud services architecture from A10 Networks provides data centre operators with new delivery model for application networking and security services
 
Gartner accolade consolidates ForeScout position as NAC leader
Network Security, Routers and Data Centres : 28 January, 2014
Pervasive network security system provider recognised for industry leadership in Gartner report for third consecutive year.
 
Critical infrastructure protection for Turkish bank
Network Security, Routers and Data Centres : 28 January, 2014
A bank in Turkey is protecting its data centres and network infrastructure with remote management gateways at branch offices from Opengear
 
PAN-OS support integrates endpoint and network security
Data Protection : 28 January, 2014
Bit9 is bringing integrated endpoint and network security to Palo Alto Networks through support for version 6.0 of the PAN-OS operating system from Palo Alto
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo