Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Threat intelligence platform for preventing attacks
Anti-virus and anti-malware software : 23 May, 2014
The ThreatCloud IntelliStore from Check Point gathers threat intelligence from multiple sources to provide enhanced threat protection
 
Cyberworld portal shows real-time statistics
Anti-virus and anti-malware software : 23 May, 2014
A portal released by Kaspersky Lab provides realtime malware and threat information statistics
 
Cloud security supports VPN access to Azure platform
Cloud Computing Security : 23 May, 2014
FortiGate security appliances now support a wider range of cloud platforms with the addition of Microsoft's Azure
 
Heartbleed protection best practices
Data encryption : 22 May, 2014
Kalle Jääskeläinen of SSH Communications Security explains the seriousness of the consequences of Heartbleed and best practices for protecting against them
 
Online pet fraud on the rise
Anti-virus and anti-malware software : 22 May, 2014
Bitdefender is warning pet lovers of the appearance of fraudulent web sites targeting pet owners in the UK
 
IT security gap widens with extended BYOD
Mobile computing security : 22 May, 2014
Webroot survey shows how unsecured employee owned devices now outnumber the quantity of devices managed by the companies they work for
 
Mobile security and antivirus app for Android devices
Mobile computing security : 22 May, 2014
BullGuard is now providing smart protection for phones and tablets operating on the Android platform with its new Mobile Security and Antivirus app
 
Secure microcontroller for e-Government applications
Data Protection : 21 May, 2014
Dual interface secure microcontroller supplies strong user authentication for e-Government applications such as ID and health insurance cards
 
Austalian partnership for IT security and compliance products
Network Security, Routers and Data Centres : 21 May, 2014
Shearwater Solutions will supply New Net Technologies products for device vulnerability and configuration management in the Australian market
 
Portable device encryption survey results
Data encryption : 21 May, 2014
iStorage has discovered that as many as half of security professionals interviewed at InfoSecurity Europe don't encrypt data held on removable storage devices
 
Microsoft deployment support from NG firewall
Network Security, Routers and Data Centres : 19 May, 2014
Azure, Hyper-V and Windows remote desktop now all supported in the latest next-generation firewall release from Barracuda Networks
 
The information time bomb at the heart of M&As
Data Protection : 19 May, 2014
Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway examines the need for integrated information security during mergers and acquisitions
 
InfoSecurity Europe cloud adoption survey results
Cloud Computing Security : 19 May, 2014
CipherCloud reports on the results of its cloud health check survey performed at the recent InfoSecurity Europe event in London
 
Real time secure transfer of large files
Data encryption : 16 May, 2014
Zertificon has released Z1 SecureHub for providing encrypted large file transfer in real time for securing sensitive data on the move
 
Software-as-a-Service penetration testing available
Data Protection : 16 May, 2014
The ImmuniWeb security testing service for web application penetration testing and vulnerability scanning is now generally available after beta testing
 
Adware removal tool available for Mac users
Anti-virus and anti-malware software : 16 May, 2014
Tool for removing aggressive adware from Mac equipment is now available from BitDefender
 
Market forecast for cloud security products
Cloud Computing Security : 16 May, 2014
Research report examines the market for cloud security services including virtualization out to 2019
 
Software secure element provides mobile application protection
Mobile computing security : 15 May, 2014
MatrixSSE provides combined hardware and software protection using whitebox cryptography to secure mobile applications
 
Cross platform privileged access management
Authentication : 15 May, 2014
On-premises and cloud application privileged access management to be demonstrated at the Microsoft TechEd event
 
Network vulnerability scanning and patch management
Anti-virus and anti-malware software : 15 May, 2014
LanGuard 2014 from GFI Software provides vulnerability scanning as well as patch management across a broader range of devices
 
Report on digital authentication using mobile devices
Mobile computing security : 14 May, 2014
Market trends and forecasts are examined in a new report covering the use of mobile devices for digital authentication
 
Secure enterprise search capability in office documents
Data Protection : 14 May, 2014
Spreadsheets, presentations and documents can be searched securely across an organisation giving access to valuable collective information assets using DatAnswers
 
Multi-factor authentication for Office 365 applications
Authentication : 14 May, 2014
SafeNet Authentication Services are now available for Microsoft Office cloud based applications and services
 
Advanced attack protection for data centres
Network Security, Routers and Data Centres : 14 May, 2014
StealthWatch FlowSensor 4000 has been released for providing large network visibility and security against advanced attacks launched against enterprise data servers and data centres
 
Prolific ransomware now affecting Android users
Mobile computing security : 13 May, 2014
Users of the Android smartphone platform are being warned of the extension of the Reveton/IcePol ransomware into the mobile operating system
 
UK consumer confusion over EU data privacy proposal
Data Protection : 13 May, 2014
EU "right to be forgotten" rules result in confusion and complacency amidst UK consumers who don't believe a new law would be effective
 
Report reveals ease of execution of some APTs
Anti-virus and anti-malware software : 13 May, 2014
Imperva intelligence report on the non-advanced persistent threat provides insight into some of the techniques used for APT execution
 
More features on cloud based antivirus product
Anti-virus and anti-malware software : 12 May, 2014
The free version of Panda Cloud Antivirus has had new features added that were previously only available on the paid version
 
IT security partnership for corporate network protection
Network Security, Routers and Data Centres : 12 May, 2014
ForeScout and Invincea have partnered to integrate user device protection technology and the CounterACT enterprise network protection platform
 
Change tracking for database vulnerability assessment
Data Protection : 02 May, 2014
The latest version of NNT Change Tracker provides system auditing and change detection for assessing vulnerabilities in databases
 
Majority of IT security professionals using 3rd party apps
Mobile computing security : 02 May, 2014
Tracking and management of end point identities is becoming more difficult with the vast majority of BYOD users introducing vulnerabilities by making use of 3rd party apps
 
Lab validation shows effectiveness of privileged account security
Authentication : 02 May, 2014
The privileged account security application from CyberArk has been shown in an ESG lab validation to provide strengthened security against advanced threats
 
Partnership to integrate network management and enforcement with security intelligence
Network Security, Routers and Data Centres : 01 May, 2014
ForeScout and LogRhythm have joined forces for an integrated platform for continuous intelligence, big data analytics and threat mitigation
 
Enterprise cloud application visibility
Cloud Computing Security : 01 May, 2014
CipherCloud for Cloud Discovery brings improved cloud application visibility and risk scoring for enterprise users
 
Improved control and visibility of encrypted channels
Data encryption : 01 May, 2014
CryptoAuditor from SSH Communications Security provides the cability for monitoring all major encryption channels
 
Adobe Flash Player vulnerability blocked
Anti-virus and anti-malware software : 01 May, 2014
A new zero day vulnerability in the Adobe Flash Player has been discovered and successfully blocked by Kaspersky Lab
 
Re-Thinking the Approach to Real-Time Network Security
Network Security, Routers and Data Centres : 30 April, 2014
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time
 
Critical infrastructure vulnerability when connected to internet feeds
Network Security, Routers and Data Centres : 30 April, 2014
Corero Networks spells out the responsibility of ISP companies in providing increased protection for customers with critical business infrasructure
 
Insider threat protection in complex IT environments
Network Security, Routers and Data Centres : 30 April, 2014
SecureSphere 10.5 from Imperva provides proactive control to address the widening gap in security resulting from increasingly complex IT infrastructures
 
NTP misuse drives DDoS attack spike
Anti-virus and anti-malware software : 30 April, 2014
Clock synchonization protocol used as basis of DDoS attacks resulting in huge spike in attack sizes during 1st quarter 2014
 
Turning the tides against cybercrime
Data Protection : 30 April, 2014
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
 
Cyber Essentials Scheme implementation tools
Software Asset Management and Compliance : 30 April, 2014
IT Governance has released a cyber essentials assessment, training, implementation and health check service for UK companies
 
Encryption in the Cloud report findings available
Data encryption : 29 April, 2014
Business attitudes to cloud storage and the need for encryption highlighted in the "Encryption in the Cloud" report now available from Thales e-Security
 
Cloud management console for endpoint protection
Data Protection : 29 April, 2014
Webroot's SecureAnywhere Global Site Manager provides endpoint protection management in the cloud
 
Wi-Fi baby monitor hacking danger
Anti-virus and anti-malware software : 29 April, 2014
Kaspersky Lab comments on the recent hacking of a baby monitor and the need to secure wi-fi devices in the home
 
Digital security tokens to protect Red Hat remote access
Authentication : 29 April, 2014
Employees of Red Hat will be able to gain secure remote access to the company IT resources using digital security tokens from Gemalto
 
Document security company acquires DRM specialist
Software Rights Management : 28 April, 2014
Digital Rights Management specialist docTrackr has been acquired by Intralinks to bolster document security and file sharing portfolio
 
Mobile security market forecast report
Mobile computing security : 28 April, 2014
The mSecurity market for secure mobile devices is examined out to the end of the decade in a new research report
 
Online stores suffer high phishing levels in March
Anti-virus and anti-malware software : 25 April, 2014
Kaspersky Lab reports on March spam with high levels of phishing attacks launched at online shopping sites
 
Retail industry suffers rise in cyber crime
Data Protection : 25 April, 2014
David Robinson, chief security officer at Fujitsu UK & Ireland discusses the recent rise in cyber-crime in the retail industry
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo