Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
IT Security
Spam levels reduce by 7% in January
Anti-virus and anti-malware software : 04 March, 2014
Global spam report shows reduction in January with content characterized by fake WhatsApp notifications and adverts for Valentine's day gifts
 
Two-Factor Authentication secures cloud service provider
Authentication : 04 March, 2014
A cloud computing service provider in Switzerland is ensuring secure access for its clients with the use of SecurAccess two-factor authentication from SecurEnvoy
 
IT protection designed for small businesses
Anti-virus and anti-malware software : 04 March, 2014
Small Office Security from Bitdefender has been developed to provide convenient protection for IT systems for smaller businesses
 
Online banking security for Dutch retail bank
Finance and Banking Security : 04 March, 2014
Dutch on-line bank, Knab has taken banking security systems including multi-device payment from Gemalto
 
Security export strategy to keep UK at the forefront of technology
Data Protection : 03 March, 2014
The UK Government's recently released security export strategy provides encouraging support to the country's cyber security industry
 
Cyber intelligence center brings faster threat response
Anti-virus and anti-malware software : 03 March, 2014
Verizon is providing its security services clients with advanced detection and response through the Cyber Intelligence Center
 
Robust administrative security required to prevent Wi-Fi viruses
Anti-virus and anti-malware software : 03 March, 2014
Bitdefender comments on the creation of the wi-fi virus and how passwords are no longer enough to provide the necessary network security levels
 
Security monitoring partner programme launched
Data Protection : 03 March, 2014
Lancope has set up a new global partner programme to meet increased demand for the StealthWatch security monitoring system
 
Free app protects Windows phones from malware
Mobile computing security : 02 March, 2014
Kaspersky Lab is providing additional safeguards from mobile malware to consumers using Windows smartphones
 
Cloud security through discovery, protection and monitoring
Cloud Computing Security : 28 February, 2014
CipherCloud expands its data protection system for helping companies adopt cloud services with secure protection of sensitive data
 
Advanced threat remediation technology
Anti-virus and anti-malware software : 28 February, 2014
Comprehensive Threat Protection platform from McAfee provides extended capabilities for protection against advanced and evasive targeted threats
 
UK industry attitudes to growth in cyber threats
Data Protection : 28 February, 2014
Research from BAE Systems Applied Intelligence shows increased spending expected in UK industry to counter expected cyber threats
 
Mobile malware diagnostics partnership
Mobile computing security : 28 February, 2014
Cellebrite has entered a technology partnership with Webroot to integrate diagnostics with mobile app reputation and URL classification service
 
Malicious Facebook posts target Android users
Mobile computing security : 27 February, 2014
Adverts direct users to fake version of Google Play to download Android apps which dial premium-rate SMS services, warns Panda Security
 
Putting simplicity into effective file integrity monitoring
Data Protection : 27 February, 2014
Mark Kedgley of New Net Technologies explains the importance of real time file integrity monitoring and how it can be achieved without unnecessary complexity
 
Fraud prevention system for online payments
Anti Fraud software : 27 February, 2014
The fraud prevention platform from Kaspersky Lab provides protection from fraud for online payments from either computers or mobile devices
 
Android apps a significant risk for small businesses
Mobile computing security : 27 February, 2014
McAfee study shows that small businesses using Android devices are at risk if they don't have effective mobile device management strategies
 
New architecture enables immediate protection from latest threats
Anti-virus and anti-malware software : 27 February, 2014
Check Point has further reduced the time for converting threat intelligence into immediate protection with the development of its software defined protection architecture
 
Risk management and compliance for cloud servers
Network Security, Routers and Data Centres : 27 February, 2014
Server Suite 2014 from Centrify provides protection from data centre risks relating to external attacks or the insider threat
 
Partnership bolsters protection from DDoS attacks
Anti-virus and anti-malware software : 27 February, 2014
Lancope and Radware are combining their expertise to provide advanced detection and mitigation against Distributed Denial of Service attacks
 
Unified security policy orchestration for complex environments
Network Security, Routers and Data Centres : 26 February, 2014
The latest version of Tufin's Orchestration Suite extends further into the network for improved policy management in increasingly complex network environments
 
Encryption key management system gains award at RSA
Data encryption : 26 February, 2014
Thales KeyAuthority gains InfoSecurity product accolade as the best encryption product as part of global excellence awards
 
Android banking trojans increased during 2013
Mobile computing security : 26 February, 2014
Mobile threat landscape report from Kaspersky Lab shows extent of growth of banking trojans on the popular Android mobile platform
 
Public cloud service security risks
Cloud Computing Security : 26 February, 2014
Axway survey results indicate the attitudes of security professionals to the dangers of using public cloud services for file sharing in the workplace
 
Mobile security protection for Android devices
Mobile computing security : 26 February, 2014
Android security from BitDefender provides anti-theft and privacy protection as well as malware detection
 
Industry collaboration for improved security defences
Network Security, Routers and Data Centres : 26 February, 2014
The HP security portfolio provides organizations with the means for proactive sharing of threat intelligence to collaborate on improved security
 
Digital ID and data protection for consumers
Authentication : 26 February, 2014
WISeKey is extending corporate digital protection and digital identification solutions for use by individuals
 
Secure internet access for mobile users
Mobile computing security : 26 February, 2014
Mobile ID service platform from Gemalto provides network operators to provide secure internet access for subscribers
 
Network forensic extension for Sourcefire Defense Center
Network Security, Routers and Data Centres : 26 February, 2014
The Endace Fusion Connector from Emulex provides 100GbE packet capture and intrusion detection for Defense Center from Sourcefire
 
Security not keeping up with pace of M2M usage
Data encryption : 25 February, 2014
The internet of things is driving increased demand for encrypted M2M communications with industry failing to keep up with related security management, according to new report
 
Lower operation costs on HSM cryptography
Finance and Banking Security : 25 February, 2014
Utimaco has created CryptoServer LAN V4 with a reduction in operational costs for HSM equipment
 
Mobile authentication for South Korea
Authentication : 25 February, 2014
SIM-based embedded software mobile identification and authentication system from Valimo Wireless is being used for mobile subscribers in South Korea
 
Cloud solution for enterprise mobile security
Mobile computing security : 25 February, 2014
Partnership between Zscaler and Samsung Electronics brings integrated enterprise mobile security for Androids using cloud technology
 
Cloud based vulnerability management
Data Protection : 25 February, 2014
Free vulnerability management system provides cloud based service for smaller businesses of up to 100 IP addresses
 
Cloud based threat intelligence to combat APTs
Data Protection : 25 February, 2014
BrightCloud and BreachLogic from Webroot provide protection from advanced threats on endpoint devices within the enterprise
 
Cloud based security and performance monitoring
Anti-virus and anti-malware software : 24 February, 2014
GFI Cloud has been developed for the small business sector enabling full security updates and performance monitoring for IT administrators
 
Network monitoring data capture card
Network Security, Routers and Data Centres : 24 February, 2014
Low cost PCI card provides IT administrators with packet capture capabilities for full network monitoring applications
 
DDoS prevention company acquisition
Anti-virus and anti-malware software : 24 February, 2014
Akamai strengthens its portfolio for the cloud based prevention of Distributed Denial of Service attacks with the acquisition of Prolexic
 
Beta version of cloud based antivirus available
Anti-virus and anti-malware software : 24 February, 2014
Panda Security is making the beta version of its latest cloud based antivirus system available
 
Continuous endpoint compliance both on and off the corporate network
Network Security, Routers and Data Centres : 24 February, 2014
ForeScout RemoteControl enables organisations to extend endpoint control to corporate and BYOD equipment not connected to the enterprise network
 
Mobile device threat complexity sees annual growth
Mobile computing security : 21 February, 2014
Threat report from Webroot features the growth in mobile threats exposing company IT systems to malicious attacks
 
Security company becomes involved in safe internet use promotion
Internet Security and Content Filtering : 21 February, 2014
The Get Safe Online initiative for promoting the safe and responsible usage of the internet in the UK has been joined by security company BullGuard
 
Next generation secure authentication system for businesses
Authentication : 20 February, 2014
ESET secure authentication provides businesses of all sizes with updated two-factor authentication for data access security
 
Key senior appointments made at ForeScout
Network Security, Routers and Data Centres : 20 February, 2014
Network access control specialist ForeScout has appointed three experienced executives into key roles to bolster continued growth
 
Cell base station security for 4G and LTE Networks
Mobile computing security : 20 February, 2014
The LTE Small Cell Security system from Clavister provides small cell base station security for mobile operators
 
Privileged account auditing for reduced vulnerability
Data Protection : 20 February, 2014
A tool for the discovery and auditing of privileged accounts on networks can be used for the prevention of pass-the-hash style attacks
 
Internal security breaches a serious issue in UK industry
Data Protection : 19 February, 2014
Report details extent of the insider threat to UK businesses with only a quarter of IT professionals considering it to be a security priority
 
On-device mobile authentication partnership
Authentication : 19 February, 2014
Nok Nok Labs and Trustronic are collaborating on simplifying on-device authentication systems which make use of device security features
 
Health insurer protects data from unauthorised access
Data Protection : 19 February, 2014
Highly sensitive patient data held by Tasmanian health insurance company gains protection with the use of DatAdvantage from Varonis Systems
 
Security chip hardens mobile devices against vulnerabilities
Mobile computing security : 19 February, 2014
The VaultSEcure secure element for mobile devices provides protection for DRM, virtual private networks and data at rest
 
First | Prev  | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo