Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Controlled secure file sharing for university data
Network Security, Routers and Data Centres : 11 February, 2015
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
 
Continuous monitoring and mitigation protects European digital classified ads platform
Network Security, Routers and Data Centres : 11 February, 2015
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
 
Anthem attack demonstrates need for more than static defence
Data Protection : 09 February, 2015
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
 
Managed keys for customer control of cloud encryption
Data encryption : 09 February, 2015
Individual customized control over access to different elements of cloud data through encryption keys provides better business specific access control and management
 
Ghost vulnerability on legacy Linux platforms
Anti-virus and anti-malware software : 09 February, 2015
Veracode releases statistics on the vulnerability of Linux systems to the Ghost vulnerability providing remote control
 
Missing patch detection and vulnerability assessment scanning
Anti-virus and anti-malware software : 09 February, 2015
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches
 
Network security eBook examines UTM
Unified Threat Management : 06 February, 2015
WatchGuard Technologies has published an eBook to provide companies with information on how to use Unified Threat Management to future-proof their network security
 
Survey probes data security in education sector
Data encryption : 06 February, 2015
A study from iStorage shows that lack of encryption on portable storage devices is putting sensitive education sector data at risk from exposure
 
Security company examines online dating fraud
Data Protection : 06 February, 2015
iovation provides details of the latest trends in online dating fraud and what consumers and businesses need to look out for to identify potential scams
 
Malicious adware continues to plague Android apps
Mobile computing security : 06 February, 2015
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices
 
Firewall for VMware virtualised environments
Network Security, Routers and Data Centres : 06 February, 2015
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments
 
NG firewalls provide hockey fans with secure internet access
Network Security, Routers and Data Centres : 04 February, 2015
The Swedish Hockey League is using Clavister's security gateway to enable network segregation and give fans access to online services
 
Analyst portal provides improved decision making
Data Protection : 04 February, 2015
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making
 
Risk management with advanced threat analytics
Data Protection : 04 February, 2015
Management and analytics console provides IT security managers with advanced threat detection capability to identify data breach threats
 
Study charts enterprise cloud usage risks
Cloud Computing Security : 04 February, 2015
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
 
UK telecom company software ensures payment card compliance
Payment cards and e-commerce security : 04 February, 2015
BCH Digital ensures the compliance of its hosted telephone card payment service with the PCI DSS standard using software from New Net Technologies
 
Google data privacy policy re-write an example for all
Data Protection : 03 February, 2015
Sue Trombley of Iron Mountain explains the implications of the ICO's pressure on Google to re-write its data privacy policy
 
Network Access Control market report recognises ForeScout as having largest deployments
Network Security, Routers and Data Centres : 03 February, 2015
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
 
Threat of increased untrusted certificate use
Anti-virus and anti-malware software : 02 February, 2015
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
 
Award recognition for anti-virus product
Anti-virus and anti-malware software : 02 February, 2015
AV-Comparatives have chosen Bitdefender for its product of the year title for the second year in succession
 
Beyond access control with next-generation NAC
Network Security, Routers and Data Centres : 02 February, 2015
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
 
The real consequences of a DDoS attack
Anti-virus and anti-malware software : 30 January, 2015
Kaspersky Lab explains how a DDoS attack can have serious financial and operational consequences on the target organisation
 
Central management and application control on new firewall
Network Security, Routers and Data Centres : 29 January, 2015
The latest addition to Clavister's Wolf series of firewall appliances provides full control and management for entry-level enterprise security
 
Privileged account management growth in 2014
Authentication : 29 January, 2015
BeyondTrust reflects on a year of growth during 2014 in both privileged account and vulnerability management as customer demand increases
 
DDoS Security as a Service implementation
Data Protection : 28 January, 2015
Joe Eskew of NSFOCUS explains the three steps required for implementing DDoS Security as a Service technology for protection against attacks
 
Continuous recording capability for endpoint threat detection
Anti-virus and anti-malware software : 28 January, 2015
The latest release of Carbon Black provides continuous endpoint recording and live incident response through remote connection throughout the enterprise
 
Research into social media use in education
Internet Security and Content Filtering : 28 January, 2015
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments
 
Higher education IT security recognition for two products
Network Security, Routers and Data Centres : 28 January, 2015
CounterACT and ControlFabric have achieved recognition for successful deployment within higher education
 
Skimming detection device for ATMs
Finance and Banking Security : 23 January, 2015
A bank in Qatar is now able to detect card skimming attempts as well as capturing a facial image of the culprit using new software from iOmniscient
 
Secure billing system for digital magazine distributor
Payment cards and e-commerce security : 23 January, 2015
French distributor selects Netsize from Gemalto for secure online billing operations for digital downloads using mobile payments
 
Secure online services for Turkish bank
Finance and Banking Security : 23 January, 2015
Halkbank of Turkey is improving security for its internet and mobile banking clients with the introduction of security technology from Kobil Systems
 
Can biometrics replace passwords
Authentication : 22 January, 2015
Infobip explains the role of biometrics as a secure authentication method if used with a second identification factor
 
Data centre migration challenges
Network Security, Routers and Data Centres : 22 January, 2015
Security and compliance feature in the key three considerations for successful migration of data centres
 
Reducing enterprise password management risk
Data Protection : 22 January, 2015
Pooled service account rotation feature in Enterprise Random Password Manager reduces risks and disruptions when dealing with privileged accounts
 
Enhanced cyber threat detection and response
Data Protection : 22 January, 2015
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats
 
Secure payment platform for non-profit market
Payment cards and e-commerce security : 20 January, 2015
Security-as-a-Service platform from Alert Logic will protect large volumes of online transactions being performed by Valldata for the non-profit segment in the UK
 
Leaked picture fraud takes hold on Facebook
Internet Security and Content Filtering : 19 January, 2015
Bitdefender is warning users of social network sites not to be duped into falling for the latest viral or trending snapchat leaks
 
Device sharing risk for mobile users
Mobile computing security : 19 January, 2015
Survey results show mobile device owners are taking considerable risks in openly sharing their internet enables smartphones and tablets
 
Modular Tier III data centre to be built in The Netherlands
Network Security, Routers and Data Centres : 15 January, 2015
Datacentre design and operating company, ICTroom will provide a modular, Tier III facility for Cegeka to be operational in June this year
 
Social media security compliance for business networking site
Anti-virus and anti-malware software : 15 January, 2015
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts
 
Old Android versions need upgrading to remain safe from cyber threats
Mobile computing security : 15 January, 2015
Bitdefender explains why users of older versions of the Android smartphone platform may be vulnerable unless they perform an upgrade
 
SMS spam abuse spreads to new channels
Mobile computing security : 15 January, 2015
AdaptiveMobile explains how the abuse of the SMS messaging service is now spreading to adopt new channels
 
AMD provides open source firewall power
Network Security, Routers and Data Centres : 14 January, 2015
The OPNsense firewall appliance makes use of the AMD G-Series SOC for network security
 
Network visibility improvements for large healthcare trust
Network Security, Routers and Data Centres : 14 January, 2015
A healthcare provider in Northern Ireland has solved the problem of increasing numbers of non-managed endpoints on its network with CounterACT technology from ForeScout
 
Centralised security for mail serviers
Data Protection : 14 January, 2015
GFI MailEssentials 2015 is now available for management and security of multi mail servers
 
Human factors in corporate cyber security
Data Protection : 13 January, 2015
Cisco explains how the insider threat isn't necessarily malicious but stems from employees unwittingly putting corporate data at risk
 
Data privacy in the internet of things
Data Protection : 13 January, 2015
Telit Wireless explains how it is protecting consumers from threats in embedded computing on the back of large numbers of IoT announcements at CES 2015
 
Data privacy protection for investment management company
Data Protection : 12 January, 2015
Campbell Global is using DatAdvantage and IDU Classification Framework from Varonis for ensuring the security and privacy of its data
 
To stay safe from cybercrime small firms need to stop thinking like consumers
Anti-virus and anti-malware software : 12 January, 2015
Kaspersky Lab examines the cyber security dilemma of smaller companies and shows how they need to start emulating larger firms in their approach to data security
 
Learning lessons from 2014 threats for a secure new year
Internet Security and Content Filtering : 08 January, 2015
2015, when companies will realise they aren’t 100% secure, and consumers will begin to take care of their own security business
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo