Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
IT Security
Guide released for next generation network access control
Network Security, Routers and Data Centres : 16 April, 2014
An e-book has been released which provides a comprehensive guide to next generation network access control technology
Business context crucial in risk assessment
Data Protection : 15 April, 2014
Survey results show importance of business context in the prioritisation of IT security vulnerabilities
UK industry failing to control insider threats
Data Protection : 15 April, 2014
Study from LogRhythm shows the extent to which rogue insiders have free rein on company data in UK industry
The use of 2FA in preventing data spying
Authentication : 15 April, 2014
SecurEnvoy is attending InfoSecurity Europe to address the way 2FA can be used to close back doors and prevent data spying
UTM and firewall acceleration using Intel Core processors
Unified Threat Management : 15 April, 2014
A new series of hardware security appliances from Sophos gains enhanced performance using new Intel Core processors
Spam campaign exploits cheap share prices
Anti-virus and anti-malware software : 15 April, 2014
The old pump and dump scam is being exploited once more in a new spam campaign as explained by AppRiver
Interactive cyberthreat map of security incidents
Anti-virus and anti-malware software : 09 April, 2014
IT professionals can now visualize cyber security incidents with a new interactive cyberthreat map launched by Kaspersky Lab
APT Blocker for advanced persistent threat management
Advanced Persistent Threat (APT) protection : 09 April, 2014
Advanced persistent threat blocking system available for UTM and next generation firewall appliances
Housing association takes integrated IT protection
Anti-virus and anti-malware software : 09 April, 2014
Axiom Housing Association has chosen Panda Cloud Fusion for its integrated system for IT security, management and remote support
Research shows preference for on-premises file sharing and collaboration
Data Protection : 07 April, 2014
Varonis research demonstrates preferences amongst IT professionals for on-premises systems rather than cloud based
Malicious android dating application
Mobile computing security : 07 April, 2014
BitDefender is warning Android users of malicious downloads being spread through Tinder application
Firewall, web and backup systems on show at InfoSecurity Europe
Network Security, Routers and Data Centres : 07 April, 2014
Barracuda Networks is attending this year's InfoSecurity Europe event in the UK with its range of IT security products including firewall, backup and web protection systems
Preventing avoidable data breaches
Data Protection : 04 April, 2014
Iron Mountain comments on the Cumbria County Council data breach and how such avoidable incidents can be prevented
Phishing attack research findings
Anti-virus and anti-malware software : 04 April, 2014
Kaspersky Lab looks into the anatomy of phishing attacks, discovering that around a third are aimed at the theft of money
Intelligence feed keeps anti-malware software up to date
Anti-virus and anti-malware software : 04 April, 2014
Arbor Networks is using reputation based intelligence feeds to enable users of its Pravail products to identify and mitigate threats quickly
Undiscovered threat protection in latest anti-malware release
Anti-virus and anti-malware software : 04 April, 2014
ZoneAlarm gains an upgrade for 2015 with a redesign aimed at fighting web-based malware and protecting from undiscovered threats
Secure offline access to mobile devices
Mobile computing security : 04 April, 2014
Mobile Helix explains the risks associated with offline access on mobile devices and how vulnerabilities can be reduced
Securing big data from the latest threats
Data Protection : 03 April, 2014
Jonathan Lewis of SSH Communications Security examines the growth in big data and the implications for ensuring security
Swedish IT supplier embraces two-factor authentication
Authentication : 03 April, 2014
SecurEnvoy is operating with a Scandinavian IT security distributor on supplying two-factor authentication software for local markets
Unified identity services supplier wins European Award
Authentication : 03 April, 2014
Centrify is celebrating its success in picking up the European Software Vendor of the Year title for its channel partner programme
Image level encryption for AWS public cloud
Data encryption : 02 April, 2014
Preconfigured Amazon Machine Images enable companies to store sensitive information and applications in public clouds
Global threat intelligence report available
Data Protection : 02 April, 2014
Threat avoidance, response and detection feature within the 2014 global threat intelligence report from NTT Group
Cashless payment technology on show
Payment cards and e-commerce security : 02 April, 2014
Apriva is attending the NAMA OneShow to exhibit its system for secure cashless payment systems for educational institutions
Large numbers of companies still operating unsupported Windows XP
Data Protection : 02 April, 2014
With less than a week left before support is withdrawn from Windows XP, Appsense finds over three quarters of UK companies still running the old OS
XP users advised to increase defences
Data Protection : 02 April, 2014
LogRhythm provides advice to Windows XP users on how to take action to minimise vulnerability risk after support withdrawal
Detailed study into advanced evasion techniques
Advanced Persistent Threat (APT) protection : 01 April, 2014
Report from McAfee unravels the confusion associated with Advanced Evasion Techniques and their role in Advanced Persistent Threats
Highways Agency to improve network security
Network Security, Routers and Data Centres : 31 March, 2014
Thales will work with the UK's Highways Agency on network security improvements including encryption and remote access services
School improves network security with UTM
Unified Threat Management : 31 March, 2014
Unified Threat Management platform from WatchGuard Technologies provides improved wireless network security for Sevenoaks School
Toughpad tablets gain MOD standard encryption
Data encryption : 31 March, 2014
Becrypt has worked with Panasonic to provide encryption to the requirements of the UK MoD for use in the Toughpad tablet computer
University improves security and access control on wireless network
Network Security, Routers and Data Centres : 31 March, 2014
Student and staff BYOD security challenges have been overcome at Nottingham Trent University with the use of ForeScout CounterACT for security monitoring and risk mitigation
Organizations avoiding cloud services for fear of snooping
Cloud Computing Security : 27 March, 2014
RSA Conference survey by Lieberman Software reveals up to a third of companies are avoiding keeping data in the cloud because of Government snooping fears
Personal data protection warning as USA prepares tax returns
Data Protection : 27 March, 2014
iovation is warning US tax payers of the dangers of internet fraud and identity theft during the season for filing tax returns
Application delivery controllers integrated with SAP
Anti-virus and anti-malware software : 27 March, 2014
The Thunder series of application delivery controllers including distributed denial of service protection from A10 Networks has been integrated with SAP ERP applications
Antivirus company forms alliance with anti-bullying charity
Anti-virus and anti-malware software : 27 March, 2014
International organisation dedicated to the prevention of bullying in the UK and Europe forms partnership with IT security supplier BullGuard
Fraud detection market research
Anti Fraud software : 27 March, 2014
Report forecasts the market for fraud detection and prevention products worldwide until 2018
Behaviour based network security monitoring
Network Security, Routers and Data Centres : 26 March, 2014
StealthWatch from Lancope now has improved network visibility and context to provide accelerated threat detection and incident response
Six encryption options for protecting data in the cloud
Data encryption : 26 March, 2014
SafeNet describes the six best ways of ensuring sensitive data in the cloud is stored with strong encryption and authentication
Mobile payment acceptance software on show
Finance and Banking Security : 26 March, 2014
Apriva is attending Transact 14 event to demonstrate its range of products for secure Point-of-Sale (POS) transactions
Digital rights management for broadband TV
Software Rights Management : 26 March, 2014
Octoshape and INSIDE secure are collaborating in the delivery of Digital Rights Management for the protection of copyrighted services delivered on broadband TV
Multi-factor authentication acquisition
Authentication : 25 March, 2014
Ping Identity tackles the challenges of secure mobile authentication with the acquisition of multi-factor authentication company, accells technology
Report reveals market trends in homomorphic encryption
Data encryption : 25 March, 2014
A new market research report is available for examining the future trends in the use of homomorphic encryption technology
Public offering on IT security company
Network Security, Routers and Data Centres : 24 March, 2014
Pricing details have been released for the IPO of security company, A10 Networks
Security analytics system for advanced threat detection
Advanced Persistent Threat (APT) protection : 24 March, 2014
Arbor Networks releases Pravail Security Analytics for the detection of advanced threats and incident reponse management
Confidential data leak risk with former employees
Data Protection : 24 March, 2014
Incident involving former Microsoft employee demonstrates the risks to companies of data security when employees leave the company
Network security specialist expands in USA
Network Security, Routers and Data Centres : 24 March, 2014
Gateprotect expands into the American market for IT network security products with the appointment of a distributor in the region
Market trends examined in multi-factor authentication
Authentication : 24 March, 2014
New report forecasts the next three years in the global market for multi-factor authentication products for improved access management
Analysis of spam environment in February
Anti-virus and anti-malware software : 21 March, 2014
Kaspersky Lab releases its analysis of spam during February with Valentine's day exploitations featuring highly both in e-mail and on social networks
Advanced threat protection partnership
Network Security, Routers and Data Centres : 20 March, 2014
ForeScout forms technology partnership with Damballa to provide automatic breach detection and mitigation of advanced threats
Anti-phishing and social media scanning for Mac users
Anti-virus and anti-malware software : 20 March, 2014
Latest ESET Cyber Security product for Mac OS X includes features for protection against phishing as well as social media scanning for Facebook and Twitter users
High performance block rates for zero day malware
: 20 March, 2014
Benchmarking tests have shown the efficiency of sandboxing technology from Check Point in protecting users from new malware and targeted attacks
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo