Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Cyber insurance goes hand in hand with good practices
Data Protection : 10 November, 2014
LogRhythm comments on the UK cyber-insurance market study and the need to combine insurance cover with good practices in protecting IT assets
Interactive incident timeline speeds up investigations
Data Protection : 07 November, 2014
The UserInsight behaviour analytics software from Rapid7 now features interactive incident timeline for faster investigation capability
SIEM and privileged threat analytics integration
Authentication : 07 November, 2014
CyberArk has integrated its Privileged Threat Analytics with the Enterprise Security Manager SIEM product from McAfee
Swiss IT security company acquisition
Internet Security and Content Filtering : 05 November, 2014
NTT Com Security further expands its presence in Europe with the acquisition of Swiss IT security company, InfoTrust
Advanced integrated internet security software
Internet Security and Content Filtering : 05 November, 2014
BullGuard introduces next generation software for internet protection including unwanted app protection functions
Wordpress fixes plug-in vulnerability
Internet Security and Content Filtering : 05 November, 2014
A vulnerability in the LiveSupporti WordPress plug-in has been fixed after Check Point raises the issue with the CMS supplier
Seamless business data security on mobile devices
Mobile computing security : 30 October, 2014
Check Point has developed the Capsule product for use on mobile devices to ensure commercial data security in BYOD programmes
Technology collaboration results in enhanced infrastructure protection
Network Security, Routers and Data Centres : 30 October, 2014
ForeScout Technologies and McAfee have partnered to combine CounterACT with McAfee products to gain additional protection through the exchange of threat intelligence.
Prevention of mobile and browser based fraud
Anti Fraud software : 29 October, 2014
Software Development Kit available from iovation for mobile devices for the development of location based and other fraud prevention tools
World skiing championship venue to have secure wireless networking
Network Security, Routers and Data Centres : 29 October, 2014
All attendees of the 2015 World Skiing Championships events at Falun in Sweden will have access to secure outdoor wireless networking facilities
On-demand intelligent DDoS mitigation for service providers
Network Security, Routers and Data Centres : 29 October, 2014
The release of Arbor Cloud gives service providers intelligent protection for Distributed Denial of Service attacks on demand
P2PE certification ensures security of cardholder data
Data encryption : 29 October, 2014
Payment card industry certification from Foregenix for point-to-point-encryption (P2PE) applications adds confidence in protective capabilities for cardholder information
Network policy change automation software
Network Security, Routers and Data Centres : 28 October, 2014
Version R14-3 has been released for Tufin's Orchestration Suite for network change automation
DDoS attacks quadruple in 3rd quarter 2014
Anti-virus and anti-malware software : 28 October, 2014
Quarterly state of the internet report from Akamai shows four-fold increase in the size and volume of Distributed Denial-of-Service attacks globally
Twitter Digit service shows no change in security
Mobile computing security : 28 October, 2014
Single device control with OTP and number verification adds no significant security advantage, according to Kaspersky Lab
UTM firewalls protect beverage supplier networks
Unified Threat Management : 28 October, 2014
Global supplier of food and drink to motorway service areas and airports protects IT networks with WatchGuard UTM firewalls
High speed UTM for small and branch offices
Unified Threat Management : 28 October, 2014
Cyberoam has released a new, high speed Unified Threat Management appliance at an affordable price aimed at small and branch offices
Mobile wallet service offers tokenization for mobile payments
Payment cards and e-commerce security : 27 October, 2014
MeaWallet enters pilot programme with financial institutions on tokenization for mobile payments across all carrier technologies
Safe at Any Speed - Best Practices for the Era of 100G
Network Security, Routers and Data Centres : 27 October, 2014
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks
SSH Key management available with privileged account security management
Data encryption : 24 October, 2014
CyberArk has added SSH key management to its privileged account security management platform
Test results in five stars for access control software
Network Security, Routers and Data Centres : 24 October, 2014
ForeScout has taken a top award from SC Magazine for CounterACT after receiving a five star rating in group tests
User identification service management for cloud subscribers
Authentication : 24 October, 2014
Authentication software from Centrify is at the heart of a new Identit-as-a-Service product from AVG for use by managed service providers
WebUI vulnerabilities expose system admin portals
Anti-virus and anti-malware software : 22 October, 2014
Security experts at Check Point have discovered WebUI vulnerabilities in System Admin Portals enabling administrator credential theft
Maintaining effectiveness in a changing security market
Data Protection : 20 October, 2014
Kevin Townsend explains the way the IT security industry is changing and how companies need to be both efficient and effective in what they do
DDoS Mitigation for hosting service providers
Network Security, Routers and Data Centres : 20 October, 2014
NSFOCUS is now providing the ADS 8000 anti-Distributed Denial of Service system to provide layered protection for hosting service providers
IT security challenges for the next generation of governments
Anti-virus and anti-malware software : 20 October, 2014
Report from McAfee examines digital trends to provide a vision of the security challenges that will be faced by governments of the future
Future Android attacks could exploit the Binder
Mobile computing security : 20 October, 2014
Messaging passing mechanism in Android smartphone devices exposed as a potential vulnerability in next generation attacks
Network security UK parner award
Network Security, Routers and Data Centres : 20 October, 2014
Palo Alto Networks has recognized NTT Com Security with UK Partner and EMEA Reseller of the Year awards
Cloud based security protection for Mac users
Anti-virus and anti-malware software : 16 October, 2014
Intego has released an integrated system for security and activity monitoring for business users of Apple Mac computers
Measuring success in threat management programmes
Data Protection : 16 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
Remote data recovery for help desk staff
Backup, Data Recovery and Disaster Recovery : 16 October, 2014
Data recovery and diagnostic tool from Guidance Software enables IT help desk operators to recover deleted and lost files in the enterprise
Secure authentication for public sector network
Authentication : 16 October, 2014
The Shetland Islands Council has improved security and remained PSN compliant with the implementation of 2FA network access control from SecurEnvoy
Efficient back up systems result in casual approach to saving documents
Backup, Data Recovery and Disaster Recovery : 14 October, 2014
A study by Iron Mountain has shown the worst offenders for not using a well-organised approach to saving data, a problem made worse by efficient back-up methods
Creating an IT Metrics programme to Safeguard the Network
Data Protection : 14 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
Employers being put at risk by poor password habits
Authentication : 14 October, 2014
Centrify reveals the conclusions from its research looking into poor password habits and the cost to associated businesses
UK distributor signed for enterprise security systems
Anti-virus and anti-malware software : 10 October, 2014
Bitdefender has signed e92plus in the UK to supply the market with security software for cloud and virtual environments
Low cost high security encrypted hard drive
Data Protection : 10 October, 2014
Imation has produced a high performance external USB 3.0 hard drive with cloud-based management console and Government grade security
Advanced threat detection on new NG firewall
Network Security, Routers and Data Centres : 10 October, 2014
Barracuda's latest next-generation firewall products feature granular control and advanced threat detection capabilities
FIPS validation for cloud visibility and data protection
Data Protection : 08 October, 2014
Cryptographic Module Validation Programme from CipherCloud gains Federal Information Processing Standards (FIPS) validation
Combined UTM and Firewall eases application of network policies
Unified Threat Management : 08 October, 2014
The Firebox M440 combined Unified Threat Management and Next-Generation Firewall appliance from WatchGuard enables companies to apply the right policies to correct network segments
Eliminate hardware investments with tokenless authentication
Authentication : 08 October, 2014
Remote network access can be achieved securely and with reduced cost with the adoption of tokenless two-factor authentication
Companies continue to believe perimeter security is enough to protect data
Network Security, Routers and Data Centres : 06 October, 2014
Survey from SafeNet uncovers continuing belief amongst three-quarters of respondees that firewalls are sufficient to prevent unauthorized access
Plugins continue to result in security flaws for WordPress
Internet Security and Content Filtering : 06 October, 2014
Popular Content Management Systems like WordPress continue to suffer from security flaws as a result of poorly structured plugins and extensions
Investment management company deploys pervasive network security
Network Security, Routers and Data Centres : 02 October, 2014
Pioneer Investments have taken ForeScout CounterACT to protect its network and provide real time visibility across all its endpoints.
Securing commercial networks continues to become more challenging
Network Security, Routers and Data Centres : 02 October, 2014
Fortinet has released the results of its global security survey revealing boardroom tension and the challenging reality of more complex security conditions
Large retail chain deploys two factor authentication for network access
Authentication : 02 October, 2014
Middle East based LuLu Group is controlling access to its networks for over 30,000 employees using tokenless two-factor authentication from SecurEnvoy
Continuous file assessment gives security the edge in finding malware
Data Protection : 02 October, 2014
Terry Greer-King, Director of Cyber Security at Cisco explains Advanced Persistent Threats and the ability of modern security software in assessing vulnerabilities
Proactive social media management on web filter
Internet Security and Content Filtering : 01 October, 2014
The latest version of the Bloxx web filter and secure web gateway enables more proactive management of social media as well as access to flash games
ControlFabric interoperability demonstrations at it-sa event
Network Security, Routers and Data Centres : 01 October, 2014
ForeScout will be at the it-sa event in Nuremberg to demonstrate its latest interoperability capabilities with other security systems based on the ControlFabric platform.
Cloud based security services for m-commerce
Mobile computing security : 30 September, 2014
Secure mCommerce available for app developers entering into the mobile based cloud payment systems market for mobile wallets
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo