Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Cloud based threat intelligence to combat APTs
Data Protection : 25 February, 2014
BrightCloud and BreachLogic from Webroot provide protection from advanced threats on endpoint devices within the enterprise
 
Cloud based security and performance monitoring
Anti-virus and anti-malware software : 24 February, 2014
GFI Cloud has been developed for the small business sector enabling full security updates and performance monitoring for IT administrators
 
Network monitoring data capture card
Network Security, Routers and Data Centres : 24 February, 2014
Low cost PCI card provides IT administrators with packet capture capabilities for full network monitoring applications
 
DDoS prevention company acquisition
Anti-virus and anti-malware software : 24 February, 2014
Akamai strengthens its portfolio for the cloud based prevention of Distributed Denial of Service attacks with the acquisition of Prolexic
 
Beta version of cloud based antivirus available
Anti-virus and anti-malware software : 24 February, 2014
Panda Security is making the beta version of its latest cloud based antivirus system available
 
Continuous endpoint compliance both on and off the corporate network
Network Security, Routers and Data Centres : 24 February, 2014
ForeScout RemoteControl enables organisations to extend endpoint control to corporate and BYOD equipment not connected to the enterprise network
 
Mobile device threat complexity sees annual growth
Mobile computing security : 21 February, 2014
Threat report from Webroot features the growth in mobile threats exposing company IT systems to malicious attacks
 
Security company becomes involved in safe internet use promotion
Internet Security and Content Filtering : 21 February, 2014
The Get Safe Online initiative for promoting the safe and responsible usage of the internet in the UK has been joined by security company BullGuard
 
Next generation secure authentication system for businesses
Authentication : 20 February, 2014
ESET secure authentication provides businesses of all sizes with updated two-factor authentication for data access security
 
Key senior appointments made at ForeScout
Network Security, Routers and Data Centres : 20 February, 2014
Network access control specialist ForeScout has appointed three experienced executives into key roles to bolster continued growth
 
Cell base station security for 4G and LTE Networks
Mobile computing security : 20 February, 2014
The LTE Small Cell Security system from Clavister provides small cell base station security for mobile operators
 
Privileged account auditing for reduced vulnerability
Data Protection : 20 February, 2014
A tool for the discovery and auditing of privileged accounts on networks can be used for the prevention of pass-the-hash style attacks
 
Internal security breaches a serious issue in UK industry
Data Protection : 19 February, 2014
Report details extent of the insider threat to UK businesses with only a quarter of IT professionals considering it to be a security priority
 
On-device mobile authentication partnership
Authentication : 19 February, 2014
Nok Nok Labs and Trustronic are collaborating on simplifying on-device authentication systems which make use of device security features
 
Health insurer protects data from unauthorised access
Data Protection : 19 February, 2014
Highly sensitive patient data held by Tasmanian health insurance company gains protection with the use of DatAdvantage from Varonis Systems
 
Security chip hardens mobile devices against vulnerabilities
Mobile computing security : 19 February, 2014
The VaultSEcure secure element for mobile devices provides protection for DRM, virtual private networks and data at rest
 
Securing the future with multi-factor authentication
Authentication : 17 February, 2014
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
 
UK distribution partnership for two-factor authentication
Authentication : 17 February, 2014
SecurEnvoy has partnered with Infinigate for the distribution of two-factor authentication systems within the UK territory
 
Behavioural analysis and continuous monitoring deployment
Data Protection : 17 February, 2014
Navis has taken the IDS-6300 intelligent security appliance from DB Networks for behavioural analytics and coninuous monitoring
 
Unified multi-factor authentication platform
Authentication : 14 February, 2014
The S3 Authentication Suite provides centralised multi-factor authentication for operation with a wide range of devices
 
Threat response partnership formed
Data Protection : 14 February, 2014
Bit9 and Carbon Black have joined forces to deliver rapid threat response capabilities for the IT industry
 
Mobile services platform for NFC rollout
Payment cards and e-commerce security : 14 February, 2014
Gemalto is supporting the rollout of Near Field Communications for secure payments in the Far East
 
Poor anti-theft software implementation threat
Data encryption : 14 February, 2014
Kaspersky Lab provides details of the hidden threat overshadowing poor implementations of anti-theft software that can be exploited by attackers
 
Email Defense Suite protects cloud service users
Cloud Computing Security : 13 February, 2014
Intermedia is protecting its customers with enhanced cloud security provided by McAfee Email Defense Suite
 
Less than half of parents use internet supervision controls
Internet Security and Content Filtering : 13 February, 2014
Research by ESET demonstrates gap in internet child protection as parents neglect to use supervision controls
 
Complex cyber-espionage toolkit The Mask explained
Data encryption : 13 February, 2014
Kaspersky Lab provides details of "The Mask", an advanced cyber-espionage operation comprising different attack vectors for targeting high profile victims
 
Windows user security management tool
Authentication : 13 February, 2014
Security management system for Windows 8.1 and Server 2012 R2 provides full management of users, groups, shares and rights
 
Warning of new DDoS attack toolkit launch
Anti-virus and anti-malware software : 12 February, 2014
Prolexic is issuing a warning of the availability of the DNS Flooder v1.1 toolkit for use by hackers launching malicious attacks
 
Embedded virtual security appliance
Mobile computing security : 12 February, 2014
Innominate is attending Embedded World in Germany with its mGuard eVA embedded virtual security appliance
 
Multi-platform data encryption for widespread adoption
Data encryption : 12 February, 2014
Sophos is providing easier capabilities for enterprises to adopt widespread encryption with the launch of SafeGuard Encryption 6.1
 
Study shows increase in enterprise encryption levels
Data encryption : 12 February, 2014
Key management remains a challenge for organisations deploying enterprise-wide encryption, according to study from Ponemon and Thales e-Security
 
Focus returns to remote working during recent tube strike
Data encryption : 12 February, 2014
Recent industrial action on London's underground system prompts Raj Samani of McAfee to provide advice to companies of staying secure whilst employees work remotely
 
Cloud security and compliance acquisitions
Cloud Computing Security : 10 February, 2014
Imperva is acquiring Incapsula and Skyfence to extend the company's data centre security strategy across the cloud
 
Card fraud trends examined in research report
Payment cards and e-commerce security : 10 February, 2014
Javelin research report delves into consumer password habits and the relationship to payment card data fraud instances
 
Sochi visitors vulnerable to hacking
Anti-virus and anti-malware software : 10 February, 2014
SafeNet provides advice to Sochi visitors on how to prevent data loss to hackers in one of the hacking capitals of the world
 
Second light update released in February
Anti-virus and anti-malware software : 10 February, 2014
Microsoft's security updates remain light with two critical advisories and three labelled as important
 
Unsecured intimate content at risk on Valentine's day
Mobile computing security : 10 February, 2014
McAfee is warning against being too intimate in electronic communications in the run-up to valentine's day with almost a third of people not having any basic security in place on their smartphones
 
Mainframe security acquisition
Data Protection : 07 February, 2014
Imperva acquires z/OS mainframe security expertise from Tomium Software for integrated real-time monitoring
 
One-time QR code authentication
Authentication : 07 February, 2014
One Swipe technology from SecurEnvoy provides users with the ability to authenticate themselves using a one-time QR code
 
Network access control rated as highest cyberthreat defence
Network Security, Routers and Data Centres : 06 February, 2014
A report has been published on cyberthreat defences that rates network access control as having the highest potential for counteracting threats
 
Webinar explores data breach prevention for retailers
Data Protection : 06 February, 2014
Lancope is providing retailers with insight into protection from data breaches using network visibility improvements at two forthcoming webinars
 
Online banking security for Turkish bank
Finance and Banking Security : 06 February, 2014
Kobil is supplying Application Security Technology for the protection of online banking clients at A&T Bank in Turkey
 
Large fashion retailer gains PCI DSS compliance
Payment cards and e-commerce security : 06 February, 2014
The Jack Wills fashion retailer is securing over a million transactiosn per year compliant with PCI DSS regulations using New Net Technologies
 
Privileged identity management to integrate with CARM initiative
Data Protection : 04 February, 2014
Lieberman Software chooses Exclusive Network as first UK distribution partner for its privileged management software.
 
User-defined response to network threats
Network Security, Routers and Data Centres : 04 February, 2014
Incident responders do not have the luxury of time on their side. Security success relies on rapid identification, interpreation and response to the myriad attacks infiltrating corporate networks.
 
New Sales Director to strengthen profile in US Western Region
Authentication : 04 February, 2014
Following its US launch in 2012, Swivel Secure has strengthened its US profile by appointing Steve Maloney as Western Regional Sales Director located in Swivel's US HQ in Seattle, Washington.
 
Novell acquires source code for full disk encryption
Data encryption : 03 February, 2014
Secude International reaches agreement with Novell on acquisition of source code and development rights for ZENworks full disk encryption
 
Security analytics modules extended to cloud applications
Cloud Computing Security : 03 February, 2014
Three new modules from ExtraHop bring additional data analytics capabilities for security, WAN optimisation and cloud applications
 
Mindset change needed to overcome PoS vulnerability
Data encryption : 03 February, 2014
Thales e-Security comments on the RSA discovery of Eastern European malware which steals payment card data from retail point-of-sale equipment
 
Big data analytics for improved understanding of sensitive assets
Cloud Computing Security : 03 February, 2014
Research report shows the benefits of using metadata for the analysis of sensitive information in unstructured data
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo