Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Secure authentication for remote public service workers
Authentication : 17 March, 2014
Municipal and city council workers are increasingly working remotely and gaining secure access to IT resources with two-factor authentication
 
High Alert DDoS Attack Threat Advisory
Anti-virus and anti-malware software : 14 March, 2014
New DDoS toolkits make it easier for generating high bandwidth and high volume NTP amplification DDoS attacks warns Prolexic
 
Cloud-based wireless network monitoring
Internet Security and Content Filtering : 14 March, 2014
Smaller businesses now have access to wireless monitoring, security and management tools available in a cloud computing model thereby avoiding hardware dependence
 
Report examines IT security market in Japan
Anti-virus and anti-malware software : 14 March, 2014
The Japanese market for IT Security products until 2018 is examined in a new research report
 
Network security innovation leadership award
Network Security, Routers and Data Centres : 13 March, 2014
ForeScout's innovative position in network security has been recognized with a leadership award from Frost and Sullivan
 
Connection established between Turla and military computer breach
Data Protection : 13 March, 2014
Kaspersky Lab explains the connection between the Turla cyber espionage operation and the Agent.BTZ breach of six years ago
 
Partnership delivers privileged identity management to Scandinavia
Data Protection : 13 March, 2014
Lieberman Software has expanded its reach into Scandinavia with a distribution agreement with IT2trust for privileged access management
 
Multi-layered DDoS protection for Russia during Olympic event
Anti-virus and anti-malware software : 13 March, 2014
Russia's Rostelecom protected its web services during the Sochi winter Olympic games with the use of DDoS threat mitigation services from Arbor Networks
 
Web application assessment available in open beta version
Internet Security and Content Filtering : 12 March, 2014
ImmuniWeb SaaS web application security assessment software for scanning and vulnerability assessment is openly available in beta
 
Altrecht Institute secures access for staff with two-factor authentication
Authentication : 12 March, 2014
Tokenless two-factor authentication provides secure staff identification at the Institute of Mental Health in Altrecht
 
Bank uses transaction monitoring to protect customer data
Finance and Banking Security : 12 March, 2014
ING Direct bank has taken DatAdvantage from Varonis for monitoring access to data and transactions performed
 
High speed DDoS protection appliances
Anti-virus and anti-malware software : 11 March, 2014
New range of DDoS protectioni products designed to provide high performance attack mitigation for large companies and service providers
 
UTM brings advanced threat protection to smaller businesses
Unified Threat Management : 11 March, 2014
A new Unified Threat Management platform from Sophos is aimed at providing high performance, advanced threat protection to the small and mid-market
 
Multi-factor authentication expansion in APAC
Authentication : 11 March, 2014
Supplier of multi-factor authentication products enters distribution partnership to expand its product reach into the Asia-Pacific region
 
High profile data breaches detailed in quarterly threat report
Anti-virus and anti-malware software : 11 March, 2014
The latest McAfee threat report has been released with details of the dark web malware industry and its relation to recent high profile attacks
 
Small businesses underestimate cyber attack risk
Data Protection : 11 March, 2014
Kaspersky Lab Research indicates smaller businesses in the UK are underestimating the amount of risk they face from the activities of cyber criminals
 
Endpoint security market research report
Anti-virus and anti-malware software : 11 March, 2014
Domination of the endpoint security market by five top companies is covered in a new market research report
 
Nearly half of online bankers believe banks will refund fraud losses
Anti Fraud software : 10 March, 2014
Research from Kaspersky Lab shows the extent to which people rely on bank security and a perceived willingness of the banks to compensate fraud losses
 
Tokenless two-factor authentication with single use Q-Codes
Authentication : 10 March, 2014
Innovative One-time password system developed using a Q-code passed to users telephone as a form of two-factor authentication
 
Facebook ad targeting being used as conduit for spam
Anti-virus and anti-malware software : 10 March, 2014
Bitdefender explains the latest way spammers are delivering their messages through the advertising targeting tools within Facebook
 
Evolution of Snake cyber espionage toolkit
Anti-virus and anti-malware software : 10 March, 2014
BAE Intelligent Systems dissects the Snake cyber espionage toolkit and explains how this could change the face of the cyber-security industry
 
SIEM market forecast for 5 years
Data Protection : 10 March, 2014
The market for Security Information and Event Management software (SIEM) out to 2019 is examined in a new report
 
Market forecast for cyber security products in South Korea
Anti-virus and anti-malware software : 10 March, 2014
South Korean market for cyber security products expected to grow by over 21% per year for the next four years
 
RSA attendees consider malware the highest threat
Anti-virus and anti-malware software : 07 March, 2014
AppRiver survey at the recent RSA conference shows that IT security professionals are concerned most about external malware threats
 
Hidden resources reveal increase in cybercriminals
Anti-virus and anti-malware software : 07 March, 2014
Kaspersky research of darknet resources shows that the number of cyber criminals is on the increase
 
Wireless router vulnerability exposure
Anti-virus and anti-malware software : 07 March, 2014
Massive exposures have been uncovered by Tripwire in the kinds of wireless routers used by small offices and homes
 
Automatic connectivity restoration for network service providers
Network Security, Routers and Data Centres : 05 March, 2014
Distributed enterprises and service providers can benefit from self-healing management networks with built-in 3G or LTE cellular backup
 
Small Business version of UTM
Unified Threat Management : 05 March, 2014
The Firebox T10 from WatchGuard brings enterprise level Unified Threat Management for home users and small offices
 
Unified identity management and governance
Authentication : 05 March, 2014
Dell One Identity provides integrated identity governance and privileged access management for improved performance and lower costs
 
Behavioural analysis based intruder detection
Data Protection : 05 March, 2014
DB Networks is providing advanced database threat protection through an Intruder Detection System virtual appliance based on behavioural analysis
 
Network analysis and threat detection for MNOs
Mobile computing security : 05 March, 2014
Mobile Network Operators now have access to Peakflow for the analysis of mobile networks and the detection of threats on LTE networks
 
Spam levels reduce by 7% in January
Anti-virus and anti-malware software : 04 March, 2014
Global spam report shows reduction in January with content characterized by fake WhatsApp notifications and adverts for Valentine's day gifts
 
Two-Factor Authentication secures cloud service provider
Authentication : 04 March, 2014
A cloud computing service provider in Switzerland is ensuring secure access for its clients with the use of SecurAccess two-factor authentication from SecurEnvoy
 
IT protection designed for small businesses
Anti-virus and anti-malware software : 04 March, 2014
Small Office Security from Bitdefender has been developed to provide convenient protection for IT systems for smaller businesses
 
Online banking security for Dutch retail bank
Finance and Banking Security : 04 March, 2014
Dutch on-line bank, Knab has taken banking security systems including multi-device payment from Gemalto
 
Security export strategy to keep UK at the forefront of technology
Data Protection : 03 March, 2014
The UK Government's recently released security export strategy provides encouraging support to the country's cyber security industry
 
Cyber intelligence center brings faster threat response
Anti-virus and anti-malware software : 03 March, 2014
Verizon is providing its security services clients with advanced detection and response through the Cyber Intelligence Center
 
Robust administrative security required to prevent Wi-Fi viruses
Anti-virus and anti-malware software : 03 March, 2014
Bitdefender comments on the creation of the wi-fi virus and how passwords are no longer enough to provide the necessary network security levels
 
Security monitoring partner programme launched
Data Protection : 03 March, 2014
Lancope has set up a new global partner programme to meet increased demand for the StealthWatch security monitoring system
 
Free app protects Windows phones from malware
Mobile computing security : 02 March, 2014
Kaspersky Lab is providing additional safeguards from mobile malware to consumers using Windows smartphones
 
Cloud security through discovery, protection and monitoring
Cloud Computing Security : 28 February, 2014
CipherCloud expands its data protection system for helping companies adopt cloud services with secure protection of sensitive data
 
Advanced threat remediation technology
Anti-virus and anti-malware software : 28 February, 2014
Comprehensive Threat Protection platform from McAfee provides extended capabilities for protection against advanced and evasive targeted threats
 
UK industry attitudes to growth in cyber threats
Data Protection : 28 February, 2014
Research from BAE Systems Applied Intelligence shows increased spending expected in UK industry to counter expected cyber threats
 
Mobile malware diagnostics partnership
Mobile computing security : 28 February, 2014
Cellebrite has entered a technology partnership with Webroot to integrate diagnostics with mobile app reputation and URL classification service
 
Malicious Facebook posts target Android users
Mobile computing security : 27 February, 2014
Adverts direct users to fake version of Google Play to download Android apps which dial premium-rate SMS services, warns Panda Security
 
Putting simplicity into effective file integrity monitoring
Data Protection : 27 February, 2014
Mark Kedgley of New Net Technologies explains the importance of real time file integrity monitoring and how it can be achieved without unnecessary complexity
 
Fraud prevention system for online payments
Anti Fraud software : 27 February, 2014
The fraud prevention platform from Kaspersky Lab provides protection from fraud for online payments from either computers or mobile devices
 
Android apps a significant risk for small businesses
Mobile computing security : 27 February, 2014
McAfee study shows that small businesses using Android devices are at risk if they don't have effective mobile device management strategies
 
New architecture enables immediate protection from latest threats
Anti-virus and anti-malware software : 27 February, 2014
Check Point has further reduced the time for converting threat intelligence into immediate protection with the development of its software defined protection architecture
 
Risk management and compliance for cloud servers
Network Security, Routers and Data Centres : 27 February, 2014
Server Suite 2014 from Centrify provides protection from data centre risks relating to external attacks or the insider threat
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo