Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
IT Security
BYOD security market expectations to 2018
Mobile computing security : 17 January, 2014
Report examines the security market for Bring-Your-Own-Device (BYOD) technology from 2014 to 2018
 
Evolution phases of network security management
Network Security, Routers and Data Centres : 17 January, 2014
The three phases of the evolution of network security manageability tools are detailed in a new report from Research and Markets
 
Mobile apps involved in enterprise DDoS attacks
Anti-virus and anti-malware software : 16 January, 2014
Prolexic reports on the emerging trend of mobile applications increasingly being used in Distributed Denial of Service (DDoS) attacks on enterprises
 
Consumer analyst gains greater visibility with DatAdvantage
Data Protection : 16 January, 2014
Varonis has supplied analysis and access management software to NPD Group for working effectively and transparently with consumer trend data
 
Anonymous proxies continue to be a major concern in education sector
Internet Security and Content Filtering : 16 January, 2014
The use of anonymous proxies to bypass web filtering software is a concern for over two-thirds of educational establishments in the UK
 
Analytical service to detect insurance claim fraud
Anti Fraud software : 16 January, 2014
BAE Systems Detica is working with the Canadian National Insurance Crime Services to provide analytical services for the detection of suspicious insurance claims
 
Threat protection form network wide DDoS attacks
Network Security, Routers and Data Centres : 15 January, 2014
The Thunder Threat Protection System from A10 Networks has been designed for higher performance mitigation of network-wide Distributed Denial-of-Service (DDoS) attacks
 
110 million affected by Target breach
Data Protection : 14 January, 2014
Lieberman Software comments on the Target breach which is estimated to have affected up to 110 million of its customers
 
Connected UTM platform expands enterprise protection
Unified Threat Management : 14 January, 2014
New products have been added to the Connected UTM platform for the extension of network security across distributed environments
 
The dangers of the commute for sensitive data
Data encryption : 14 January, 2014
Iron Mountain's head of Information Risk, Christian Toon, discusses the vulnerability of sensitive company data during the daily commute of company employees
 
New board member joins ForeScout
Network Security, Routers and Data Centres : 14 January, 2014
Experienced IT security industry leader joins ForeScout board of directors from Symantec
 
Market report on multi-factor authentication
Authentication : 14 January, 2014
Research report examines the market for the next two years on multi-factor authentication internationally
 
An easy start to Microsoft patching for 2014
Anti-virus and anti-malware software : 13 January, 2014
With only four advisories in Microsoft's patch update, IT administrators are getting an easy start to the year
 
Tougher hacker legislation introduced in the UK
Data Protection : 13 January, 2014
Voltage Security comments on the Personal Data Privacy and Security Act which will mean harsher punishments for hackers
 
Phishing attacks follow bank data breach
Anti-virus and anti-malware software : 10 January, 2014
Rapid7 comments on the spate of phishing attacks on Chase debit card holders following bank data breach
 
Security company hires technical manager
Network Security, Routers and Data Centres : 10 January, 2014
Research think tank pioneer joins Tenable Network Security as Technical Manager for leading security innovation at the company
 
Embedded security for mobile devices
Mobile computing security : 10 January, 2014
VaultIP embedded security protects mobile devices from becoming vulnerable to system integrity attacks
 
Predictive security intelligence collaboration
Network Security, Routers and Data Centres : 10 January, 2014
Tripwire is collaborating with Core Security for the integration of predictive security intelligence with network security elements
 
Identity and access management predictions for 2014
Data Protection : 10 January, 2014
The impact of identity and access management on IT security professionals has been predicted for 2014 by CA Technologies
 
Market analysis for deep packet inspection products
Data Protection : 10 January, 2014
Report from Research and Markets examines the International Deep Packet Inspection market to 2018
 
Complete security suite for mobile devices
Mobile computing security : 09 January, 2014
Secure browsing on mobile devices and user group management functionality included for business users requiring mobile protection
 
IT Operational Intelligence for Portsmouth Hospitals
Data Protection : 09 January, 2014
An NHS Trust in the south of England will gain high visibility of the clinical and administrative applications that it operats with the use of the EH2000V virtual appliance from ExtraHop
 
Spam messages grew by more than 120% last year
Anti-virus and anti-malware software : 09 January, 2014
Heavy increases were seen in 2013 by AppRiver in spam messages and the malware delivered through malicious embedded e-mail links
 
Dairy cooperative takes flexible user authentication for secure access
Authentication : 09 January, 2014
Cloud based identity management platform enables dairy cooperative to protect access to its IT networks globally
 
PCI approved scanning vendor status for RandomStorm
Payment cards and e-commerce security : 08 January, 2014
The Payment Card Industry Security Standards Council has once more approved RandomStorm as an approved scanning vendor
 
Distribution agreement opens US markets for Becrypt
Data encryption : 08 January, 2014
Synnex distribution agreement with Becrypt opens up critical new markets in the USA for encryption products
 
Survey shows obstacles preventing best of breed implementations
Network Security, Routers and Data Centres : 08 January, 2014
Data centre professionals are being forced into one-stop-shop security solutions over best of breed through financial considerations, according to survey
 
Five priorities for combating digital crime in 2014
Data Protection : 08 January, 2014
BAE Systems Detica provides its thoughts on the top five priorities needed in order to fight digital crime in the coming year
 
E-mail content security market research report
Internet Security and Content Filtering : 08 January, 2014
Global market research report examines internet and e-mail content security opportunities
 
Security implications of payment privacy protection
Payment cards and e-commerce security : 08 January, 2014
New research report examines payment fraud and the latest trends in Europe for the protection of payment privacy
 
Insurance company breach concludes a long list of 2013 cyber attacks
Data encryption : 07 January, 2014
SafeNet comments on the culmination of a year of high profile cyber breaches with the recent hacking of the Staysure insurance company
 
Canadian payment card processor chooses the VX 520
Data encryption : 07 January, 2014
Verifone's VX 520 countertop payment processing system will be used across Canada for debit and credit card processing
 
Data protection expert becomes Ponemon Fellow
Data Protection : 06 January, 2014
Research team head at Lancope becomes a Distinguished Fellow at the Ponemon Institute for his work on the discovery of security vulnerabilities
 
A time to take control of cyber security
Mobile computing security : 06 January, 2014
AppRiver sets out 2014 cyber security resolutions with a suggestion that now is the time to take control both from a personal and business perspective
 
IT security trends prediction for 2014
Anti-virus and anti-malware software : 03 January, 2014
The Wick Hill Group distributor of IT security software has provided its outlook on what 2014 has in store for IT security
 
High profile attacks with different implications
Data Protection : 03 January, 2014
Lancope's CTO has commented on the different natures of two recent attacks which affected Snapchat's user base and Skype's Twitter account
 
Scanning for card data under new PCI regime
Software Asset Management and Compliance : 03 January, 2014
Guidance Software's Sam Maccherola provides his take on scoping protective measures for payment card data under new PCI DSS rules
 
Network security firewall partnership extended
Network Security, Routers and Data Centres : 24 December, 2013
Check Point will provide front line support in the distribution of the X-Series platform for network security firewall markets in agreement with Blue Coat
 
IT threat trend predictions for 2014
Anti-virus and anti-malware software : 24 December, 2013
ESET looks into the coming year and sets its predictions on how the challenges of IT security protection will be changing
 
Web performance and control optimisation
Internet Security and Content Filtering : 24 December, 2013
Web experience solutions technology ups the ante for intelligently maximizing site and application performance
 
Advice on smartphone protection
Mobile computing security : 24 December, 2013
Kaspersky Lab is offering seasonal advice to smartphone owners on how to protect their devices and the valuable content on them
 
Warning of dangers associated with free mobile apps
Mobile computing security : 23 December, 2013
Zscaler is warning smartphone users to be wary of downloading free apps this Christmas and to ensure latest security is in place
 
Web filtering for virtual appliances
Internet Security and Content Filtering : 20 December, 2013
Microsoft's Hyper-V virtual appliance gains new web filter and secure gateway from Bloxx
 
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Data Protection : 20 December, 2013
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
 
Year on year increase in spam in November
Anti-virus and anti-malware software : 20 December, 2013
Kaspersky lab reports on the increase in spam traffic during november and the large number of malicious attachments in the UK
 
Protecting against the mobile malware epidemic
Mobile computing security : 20 December, 2013
Cellebrite VP R&D, David Heled advises on the consequences of mobile malware and how it can be identified, before it’s too late.
 
Internet of things comes under focus in 2014 predictions
Data Protection : 20 December, 2013
WatchGuard provides its take on what to expect in 2014 including the increasing prominence of the internet of things
 
Phishing attempts plague UK office workers
Data Protection : 19 December, 2013
Phishme study shows that office employees in the UK are seeing an increasing quantity of phishing e-mails on a daily basis
 
Global hotel takes next generation firewall protection
Network Security, Routers and Data Centres : 19 December, 2013
McAfee is providing the Stonesoft next generation firewall products for the protection of global IT systems at Accor hotels
 
Storage technology improvements change data recovery landscape
Data encryption : 19 December, 2013
Kroll Ontrack shows how changes made during 2013 in storage technology have altered the methods needed for effective data recovery
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com