Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Network security UK parner award
Network Security, Routers and Data Centres : 20 October, 2014
Palo Alto Networks has recognized NTT Com Security with UK Partner and EMEA Reseller of the Year awards
Cloud based security protection for Mac users
Anti-virus and anti-malware software : 16 October, 2014
Intego has released an integrated system for security and activity monitoring for business users of Apple Mac computers
Measuring success in threat management programmes
Data Protection : 16 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Remote data recovery for help desk staff
Backup, Data Recovery and Disaster Recovery : 16 October, 2014
Data recovery and diagnostic tool from Guidance Software enables IT help desk operators to recover deleted and lost files in the enterprise
Secure authentication for public sector network
Authentication : 16 October, 2014
The Shetland Islands Council has improved security and remained PSN compliant with the implementation of 2FA network access control from SecurEnvoy
Efficient back up systems result in casual approach to saving documents
Backup, Data Recovery and Disaster Recovery : 14 October, 2014
A study by Iron Mountain has shown the worst offenders for not using a well-organised approach to saving data, a problem made worse by efficient back-up methods
Creating an IT Metrics programme to Safeguard the Network
Data Protection : 14 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
Employers being put at risk by poor password habits
Authentication : 14 October, 2014
Centrify reveals the conclusions from its research looking into poor password habits and the cost to associated businesses
UK distributor signed for enterprise security systems
Anti-virus and anti-malware software : 10 October, 2014
Bitdefender has signed e92plus in the UK to supply the market with security software for cloud and virtual environments
Low cost high security encrypted hard drive
Data Protection : 10 October, 2014
Imation has produced a high performance external USB 3.0 hard drive with cloud-based management console and Government grade security
Advanced threat detection on new NG firewall
Network Security, Routers and Data Centres : 10 October, 2014
Barracuda's latest next-generation firewall products feature granular control and advanced threat detection capabilities
FIPS validation for cloud visibility and data protection
Data Protection : 08 October, 2014
Cryptographic Module Validation Programme from CipherCloud gains Federal Information Processing Standards (FIPS) validation
Combined UTM and Firewall eases application of network policies
Unified Threat Management : 08 October, 2014
The Firebox M440 combined Unified Threat Management and Next-Generation Firewall appliance from WatchGuard enables companies to apply the right policies to correct network segments
Eliminate hardware investments with tokenless authentication
Authentication : 08 October, 2014
Remote network access can be achieved securely and with reduced cost with the adoption of tokenless two-factor authentication
Companies continue to believe perimeter security is enough to protect data
Network Security, Routers and Data Centres : 06 October, 2014
Survey from SafeNet uncovers continuing belief amongst three-quarters of respondees that firewalls are sufficient to prevent unauthorized access
Plugins continue to result in security flaws for WordPress
Internet Security and Content Filtering : 06 October, 2014
Popular Content Management Systems like WordPress continue to suffer from security flaws as a result of poorly structured plugins and extensions
Investment management company deploys pervasive network security
Network Security, Routers and Data Centres : 02 October, 2014
Pioneer Investments have taken ForeScout CounterACT to protect its network and provide real time visibility across all its endpoints.
Securing commercial networks continues to become more challenging
Network Security, Routers and Data Centres : 02 October, 2014
Fortinet has released the results of its global security survey revealing boardroom tension and the challenging reality of more complex security conditions
Large retail chain deploys two factor authentication for network access
Authentication : 02 October, 2014
Middle East based LuLu Group is controlling access to its networks for over 30,000 employees using tokenless two-factor authentication from SecurEnvoy
Continuous file assessment gives security the edge in finding malware
Data Protection : 02 October, 2014
Terry Greer-King, Director of Cyber Security at Cisco explains Advanced Persistent Threats and the ability of modern security software in assessing vulnerabilities
Proactive social media management on web filter
Internet Security and Content Filtering : 01 October, 2014
The latest version of the Bloxx web filter and secure web gateway enables more proactive management of social media as well as access to flash games
ControlFabric interoperability demonstrations at it-sa event
Network Security, Routers and Data Centres : 01 October, 2014
ForeScout will be at the it-sa event in Nuremberg to demonstrate its latest interoperability capabilities with other security systems based on the ControlFabric platform.
Cloud based security services for m-commerce
Mobile computing security : 30 September, 2014
Secure mCommerce available for app developers entering into the mobile based cloud payment systems market for mobile wallets
UK distribution agreement for anti-virus software
Anti-virus and anti-malware software : 29 September, 2014
Ingram Micro will supply BullGuard's antivirus and mobile security software in the UK as part of a new distribution agreement
Plain language PSN connectivity white paper
Data Protection : 29 September, 2014
McAfee is making it easy for companies needing to connect to the Public Services Network (PSN) in the UK through a plain language white paper
Shellshock protection for Check Point Software
Anti-virus and anti-malware software : 29 September, 2014
Users of Check Point Software products gain protection against Shellshock vulnerability after company issues IPS protection
When is a vulnerability not a vulnerability?
Software Asset Management and Compliance : 29 September, 2014
Mark Kedgley, CTO of New Net Technologies provides information on a continuous approach to vulnerability scoring and management
Technology partnerships extended to boost data security
Data Protection : 25 September, 2014
The Cipher Technology Partner Programme run by SafeNet now has further membership extending its reach and providing greater opportunities for data protection
German gas supplier protects network with 2FA
Authentication : 24 September, 2014
Two-factor authentication technology from SecurEnvoy is protecting the corporate network of German gas supplier, Primagas
Privacy concerns uncovered as barrier to mobility
Mobile computing security : 23 September, 2014
AdaptiveMobile reports on the concerns of employees for their privacy as well as a lack of trust as barriers to mobility
Apple device management in the cloud
Data Protection : 23 September, 2014
The Centrify User Suite now includes the Mac 2014.1 component to manage and secure Mac and iOS more efficiently
Back-up strategies and ensuring that they work
Backup, Data Recovery and Disaster Recovery : 23 September, 2014
Christian Toon of Iron Mountain discusses the options available to IT administrators for providing effective data back up and recovery
How to keep contactless payment credentials secure
Data Protection : 22 September, 2014
Bitdefender explains the top security threats associated with the booming contactless payment industry with monthly spending now three times that of last year
Four year outlook on DDoS prevention market
Anti-virus and anti-malware software : 22 September, 2014
Key vendors involved in Distributed Denial of Service prevention examined in new market research report predicting market volume over next four years
Alternatives to password protection for secure authentication
Authentication : 18 September, 2014
Securenvoy explains the two-factor authentication alternative available to the inadequate and outdated technology of password
Flawless detection rate in unknown attack testing
Anti-virus and anti-malware software : 18 September, 2014
Benchmark testing using unknown malicious files gives Check Point Threat Prevention highest mark in protection against internet attacks
Hybrid DDoS Defence for cloud and on-premises environments
Anti-virus and anti-malware software : 18 September, 2014
Arbor Networks improves its CloudSM and Pravail protection systems for hybrid DDoS either in the cloud or on company premises
The importance of strong authentication in the cloud
Authentication : 18 September, 2014
David Hald of SMS Passcode explains the way that cloud environments benefit from using strong authentication technologies rather than outdated passwords for security
Cyber threat programme assessment and development
Data Protection : 15 September, 2014
Rapid7 is now offering programme development services for cyber security through its Global Strategic Services Practice
Cloud based identity and access management for Samsung
Authentication : 15 September, 2014
The identity and access management feature on Samsung's enterprise mobility management cloud based service enabled by Centrify
A new perspective on antivirus solutions
Anti-virus and anti-malware software : 15 September, 2014
Panda Security explains how antivirus software is evolving to provide advanced protection in the current IT security environment
Cloud service provider takes DDOS protection platform
Anti-virus and anti-malware software : 11 September, 2014
The Arbor Peakflow SP platform is protecting iomart cloud services from distributed denial of service attacks
Integration improves mitigation and response times
Data Protection : 11 September, 2014
UserInsight from Rapid7 now operates in conjunction with HP ArcSight ESM providing faster and more effective threat mitigation
Latest breach shows retail industry to be prime cyber attack target
Data Protection : 10 September, 2014
HP comments on the recent cyber breach at retailer Home Depot illustrating the high levels of vulnerability surrounding the lucrative retail business
Four reasons why tape based data storage isn't dead
Backup, Data Recovery and Disaster Recovery : 10 September, 2014
Christian Toon, the head of information risk at Iron Mountain explains how tape is still being used as a data storage medium
High mobile operator uptake of security software
Mobile computing security : 09 September, 2014
The top nine mobile operators are protecting their subscriber base with mobile security protection from AdaptiveMobile
Affordable Cyber Security Accreditation for Public Sector suppliers
Software Asset Management and Compliance : 09 September, 2014
The SME segment of the UK's public sector supply chain gains affordable cyber security accreditation from HP enterprise services
ForeScout expands presence in EMEA region
Network Security, Routers and Data Centres : 09 September, 2014
Increased demand in Europe for network security and continuous monitoring and mitigation leads to expanded presence in the region for ForeScout Technologies
Policy mapping ability for UTM and firewalls
Network Security, Routers and Data Centres : 09 September, 2014
WatchGuard is now able to provide the ability for IT security administrators to inspect policy configurations across unified threat management and NG-Firewall appliances
Linux malware linked to DDoS attack campaigns
Anti-virus and anti-malware software : 08 September, 2014
Akamai has released a threat advisory covering high-risk Linux system infections that can be used to launch DDoS attack campaigns
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo