Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Partnership to integrate network management and enforcement with security intelligence
Network Security, Routers and Data Centres : 01 May, 2014
ForeScout and LogRhythm have joined forces for an integrated platform for continuous intelligence, big data analytics and threat mitigation
 
Enterprise cloud application visibility
Cloud Computing Security : 01 May, 2014
CipherCloud for Cloud Discovery brings improved cloud application visibility and risk scoring for enterprise users
 
Improved control and visibility of encrypted channels
Data encryption : 01 May, 2014
CryptoAuditor from SSH Communications Security provides the cability for monitoring all major encryption channels
 
Adobe Flash Player vulnerability blocked
Anti-virus and anti-malware software : 01 May, 2014
A new zero day vulnerability in the Adobe Flash Player has been discovered and successfully blocked by Kaspersky Lab
 
Re-Thinking the Approach to Real-Time Network Security
Network Security, Routers and Data Centres : 30 April, 2014
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time
 
Critical infrastructure vulnerability when connected to internet feeds
Network Security, Routers and Data Centres : 30 April, 2014
Corero Networks spells out the responsibility of ISP companies in providing increased protection for customers with critical business infrasructure
 
Insider threat protection in complex IT environments
Network Security, Routers and Data Centres : 30 April, 2014
SecureSphere 10.5 from Imperva provides proactive control to address the widening gap in security resulting from increasingly complex IT infrastructures
 
NTP misuse drives DDoS attack spike
Anti-virus and anti-malware software : 30 April, 2014
Clock synchonization protocol used as basis of DDoS attacks resulting in huge spike in attack sizes during 1st quarter 2014
 
Turning the tides against cybercrime
Data Protection : 30 April, 2014
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
 
Cyber Essentials Scheme implementation tools
Software Asset Management and Compliance : 30 April, 2014
IT Governance has released a cyber essentials assessment, training, implementation and health check service for UK companies
 
Encryption in the Cloud report findings available
Data encryption : 29 April, 2014
Business attitudes to cloud storage and the need for encryption highlighted in the "Encryption in the Cloud" report now available from Thales e-Security
 
Cloud management console for endpoint protection
Data Protection : 29 April, 2014
Webroot's SecureAnywhere Global Site Manager provides endpoint protection management in the cloud
 
Wi-Fi baby monitor hacking danger
Anti-virus and anti-malware software : 29 April, 2014
Kaspersky Lab comments on the recent hacking of a baby monitor and the need to secure wi-fi devices in the home
 
Digital security tokens to protect Red Hat remote access
Authentication : 29 April, 2014
Employees of Red Hat will be able to gain secure remote access to the company IT resources using digital security tokens from Gemalto
 
Document security company acquires DRM specialist
Software Rights Management : 28 April, 2014
Digital Rights Management specialist docTrackr has been acquired by Intralinks to bolster document security and file sharing portfolio
 
Mobile security market forecast report
Mobile computing security : 28 April, 2014
The mSecurity market for secure mobile devices is examined out to the end of the decade in a new research report
 
Online stores suffer high phishing levels in March
Anti-virus and anti-malware software : 25 April, 2014
Kaspersky Lab reports on March spam with high levels of phishing attacks launched at online shopping sites
 
Retail industry suffers rise in cyber crime
Data Protection : 25 April, 2014
David Robinson, chief security officer at Fujitsu UK & Ireland discusses the recent rise in cyber-crime in the retail industry
 
PSN Compliance package for UK public sector
Network Security, Routers and Data Centres : 25 April, 2014
ForeScout is now offering a CounterACT based network security package that supports the UK public sector PSN Code of Compliance
 
Multi-factor authentication expansion in America
Authentication : 25 April, 2014
SMS PASSCODE expands its presence in North America with newly hired industry expert driving increased uptake of multi-factor authentication
 
Cyber threat visibility management system
Data Protection : 24 April, 2014
Check Point releases new security management and monitoring appliances for improved threat visibility in big data environments
 
Privileged identity management expansion in Europe
Authentication : 24 April, 2014
Lieberman Software is entering new partnerships in Europe to meet increased demand for privileged identity management
 
Privileged account security maturity model
Authentication : 24 April, 2014
A maturity model has been released by CyberArk to define the three phases of security privileged accounts
 
Heavily discounted anti-virus software for charities
Anti-virus and anti-malware software : 24 April, 2014
Anti-virus software from BitDefender has been made available to eligible charities with discounts of up to 90%
 
Independent review praises CounterACT 7
Network Security, Routers and Data Centres : 23 April, 2014
ForeScout's next generation network access control system gains recommended rating from the institute for the Analysis of IT components
 
Software development kit for 2FA
Authentication : 23 April, 2014
ESET releases its secure authentication software development kit for adding strong two-factor authentication
 
Two factor authentication reduces heartbleed vulnerability
Authentication : 23 April, 2014
SecurEnvoy's two-factor authentication solutions provide protection against the Heartbleed OpenSSL vulnerability
 
The evolution of technology platforms – what does this mean for businesses?
Network Security, Routers and Data Centres : 16 April, 2014
Wieland Alge, VP and general manager for EMEA, Barracuda Networks examines the evolution of technology to the "3rd platform"
 
Detection capability for Heartbleed vulnerability
Anti-virus and anti-malware software : 16 April, 2014
Tripwire's vulnerability management products are able to detect Heartbleed vulnerabilities
 
Guide released for next generation network access control
Network Security, Routers and Data Centres : 16 April, 2014
An e-book has been released which provides a comprehensive guide to next generation network access control technology
 
Business context crucial in risk assessment
Data Protection : 15 April, 2014
Survey results show importance of business context in the prioritisation of IT security vulnerabilities
 
UK industry failing to control insider threats
Data Protection : 15 April, 2014
Study from LogRhythm shows the extent to which rogue insiders have free rein on company data in UK industry
 
The use of 2FA in preventing data spying
Authentication : 15 April, 2014
SecurEnvoy is attending InfoSecurity Europe to address the way 2FA can be used to close back doors and prevent data spying
 
UTM and firewall acceleration using Intel Core processors
Unified Threat Management : 15 April, 2014
A new series of hardware security appliances from Sophos gains enhanced performance using new Intel Core processors
 
Spam campaign exploits cheap share prices
Anti-virus and anti-malware software : 15 April, 2014
The old pump and dump scam is being exploited once more in a new spam campaign as explained by AppRiver
 
Interactive cyberthreat map of security incidents
Anti-virus and anti-malware software : 09 April, 2014
IT professionals can now visualize cyber security incidents with a new interactive cyberthreat map launched by Kaspersky Lab
 
APT Blocker for advanced persistent threat management
Advanced Persistent Threat (APT) protection : 09 April, 2014
Advanced persistent threat blocking system available for UTM and next generation firewall appliances
 
Housing association takes integrated IT protection
Anti-virus and anti-malware software : 09 April, 2014
Axiom Housing Association has chosen Panda Cloud Fusion for its integrated system for IT security, management and remote support
 
Research shows preference for on-premises file sharing and collaboration
Data Protection : 07 April, 2014
Varonis research demonstrates preferences amongst IT professionals for on-premises systems rather than cloud based
 
Malicious android dating application
Mobile computing security : 07 April, 2014
BitDefender is warning Android users of malicious downloads being spread through Tinder application
 
Firewall, web and backup systems on show at InfoSecurity Europe
Network Security, Routers and Data Centres : 07 April, 2014
Barracuda Networks is attending this year's InfoSecurity Europe event in the UK with its range of IT security products including firewall, backup and web protection systems
 
Preventing avoidable data breaches
Data Protection : 04 April, 2014
Iron Mountain comments on the Cumbria County Council data breach and how such avoidable incidents can be prevented
 
Phishing attack research findings
Anti-virus and anti-malware software : 04 April, 2014
Kaspersky Lab looks into the anatomy of phishing attacks, discovering that around a third are aimed at the theft of money
 
Intelligence feed keeps anti-malware software up to date
Anti-virus and anti-malware software : 04 April, 2014
Arbor Networks is using reputation based intelligence feeds to enable users of its Pravail products to identify and mitigate threats quickly
 
Undiscovered threat protection in latest anti-malware release
Anti-virus and anti-malware software : 04 April, 2014
ZoneAlarm gains an upgrade for 2015 with a redesign aimed at fighting web-based malware and protecting from undiscovered threats
 
Secure offline access to mobile devices
Mobile computing security : 04 April, 2014
Mobile Helix explains the risks associated with offline access on mobile devices and how vulnerabilities can be reduced
 
Securing big data from the latest threats
Data Protection : 03 April, 2014
Jonathan Lewis of SSH Communications Security examines the growth in big data and the implications for ensuring security
 
Swedish IT supplier embraces two-factor authentication
Authentication : 03 April, 2014
SecurEnvoy is operating with a Scandinavian IT security distributor on supplying two-factor authentication software for local markets
 
Unified identity services supplier wins European Award
Authentication : 03 April, 2014
Centrify is celebrating its success in picking up the European Software Vendor of the Year title for its channel partner programme
 
Image level encryption for AWS public cloud
Data encryption : 02 April, 2014
Preconfigured Amazon Machine Images enable companies to store sensitive information and applications in public clouds
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo