Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Data Protection
Real Time Activity Logging At New York Agency
Data Protection : 04 April, 2011
HHS-Connect is using Novell Sentinel for IT Security and event monitoring over large-scale network involving 80,000 constituents
Encryption Solutions For High Speed Networks
Data Protection : 01 April, 2011
The Metro Ethernet family of encryption products from InfoGuard support networks of up to 10 gigabits per second for high speed data protection
Hackers Gain Access To TripAdvisor Database
Data Protection : 28 March, 2011
LogRhythm comments on the recent announcement by TripAdvisor that unauthorised access had been gained to the company's membership database Hack Reassurance Insufficient
Data Protection : 23 March, 2011
Stonesoft comments on the hack which compromised customer data saying that the low level of information is not an excuse for lax security practices Customer Details Go Missing After Successful Hack
Data Protection : 23 March, 2011
Hackers have got away with names and e-mail addresses from the database of customers of online retailer
Poor Control Of Third Parties Leads To Data Leakage
Data Protection : 23 March, 2011
LogRhythm comments on the data loss and the need for tight control over third party access to critical and sensitive data in order to prevent data loss
Poor Investment Leaves Companies Short On Data Leakage Prevention
Data Protection : 21 March, 2011
Dimension Data comments on poor industry investment levels in Data Loss Prevention and provides advice on the need for securing data against potential leakage
Swiss Bank Takes Data Loss Prevention Solution From Check Point
Data Protection : 17 March, 2011
DLP Solution From Check Point provides Bank Leumi with protection from data loss incidents as the bank improves safeguards of customer data
The Demise of Token Based Two-Factor Authentication
Data Protection : 16 March, 2011
Andrew Kemshall of SecurEnvoy explains why tokens are a thing of the past and that the way forward is for tokenless two-factor authentication using SMS
Partnership Integrates Web Application Scanning With Security Testing
Data Protection : 15 March, 2011
NTO partners with Core Security Technologies to integrate NTOSpider vulnerability scanner with all the security testing offerings availabe from Core
Part 2 Of Generation G-Mail Report Examines Hidden Risk Of Restrictive E-mail Policies
Data Protection : 10 March, 2011
Mimecast continues to examine the protection of corporate data from inadvertent leakage through the provision of e-mail policy flexibility to cater for the latest generation of corporate e-mail users
Enhanced Insider Threat Protection With SecureSphere 8.5
Data Protection : 09 March, 2011
Imperva releases SecureSphere 8.5 with agent-based monitoring and auditing to bring additional protection to organisations from the insider threat
Report Outlines Criticality of Metadata Framework For Data Security
Data Protection : 08 March, 2011
The use of metadata framework technology is the subject of a report which examines data security strategies during explosive growth in unstructured data storage
Scalable Cryptography Management Platform
Data Protection : 08 March, 2011
Cryptosoft has released an encryption service platform that can be scalably deployed across a variety of environments including cloud, virtual or on-premises configurations
Securing Personal Laptops For Business Use
Data Protection : 07 March, 2011
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure
IPS Producer Takes Core Impact Pro For Penetration Testing
Data Protection : 07 March, 2011
Core Security Technologies has supplied security software supplier Top Layer Security with Core Impact Pro for validation of security measures and penetration testing of the company's Intrusion Prevention System
Cloud Based Management Of Endpoint Devices
Data Protection : 07 March, 2011
DESlock+ Enterprise Server has been released by Data Encryption Systems enabling cloud computing based policy encryption management of endpoints
Special Offer On Upgrade To DeviceLock 7
Data Protection : 03 March, 2011
DeviceLock is encouraging customers to upgrade to version 7 of the Endpoint DLP suite from the company with special incentives being offered
CeBIT Visitors Warned Of Risks Concerning Viruses On Flash Drives
Data Protection : 03 March, 2011
Companies are risking computer infection and data loss by allowing unknown USB drives to be plugged into their computers, warns BlockMaster
Alarming Increase In USB Sticks Being Left At UK Dry Cleaners
Data Protection : 02 March, 2011
A study in the UK has shown that as many as 17,000 removable USB memory devices are left in clothes pockets each year in the UK and being sent to the cleaners
Commercial E-mail Put At Risk By Generation Gmail
Data Protection : 24 February, 2011
Mimecast reveals the trend in office environments towards using web based e-mail providers for business correspondance potentially compromising corporate data assets
Arxan Enters Market For Biometric System Security
Data Protection : 24 February, 2011
Through partnership with iris recognition supplier, Arxan provides additional layer of security through its software for the biometric market
Conseal Remote Authentication To Be Delivered Through iomart
Data Protection : 24 February, 2011
Secure authentication cloud services offered by Conseal Security will be delivered by iomart Hosting under new agreement between the two companies
Mobile Employees Gain Single Sign-On and Strong Authentication
Data Protection : 23 February, 2011
Imprivata has introduced OneSign Anywhere to enable companies to provide remote access to mobile workers with strong authentication from mobile devices without software overhead
Endpoint DLP With Contextual COntrols
Data Protection : 23 February, 2011
DeviceLock 7.0 Endpoint DLP Suite provides enhanced Data Loss Prevention including contextual protocol control
Two Factor Authentication For Children's Hospital
Data Protection : 23 February, 2011
Gemalto is providing Protiva to Seattle Children's hospital for strong authentication to gain access to patient records
IT Governance Advises Wiser Spending Of Constrained IT Budgets
Data Protection : 21 February, 2011
WIth IT budgets shrinking and protection requirements becoming stronger, IT Governance is providing advice to companies on wise spending policies to get the most benefit from available funds
Centralised Control Of USB Devices Containing Sensitive Data
Data Protection : 21 February, 2011
The Conseal USB provides increased control over USB devices containing confidential information including cloud-based management console and the ability to wipe sensitive content
Insider Threat Risk Reduction
Data Protection : 17 February, 2011
Sean Glynn of Credant Technologies offers some insight into the theft of commercial information from people inside the organisation and investigates methods that can be used to reduce the threat of insider data theft
Vendor Alliance Program For USB Device Remote Management
Data Protection : 17 February, 2011
SafeConsoleReady from BlockMaster provides USB device manufacturers with access to secure USB device management platform
Database Activity Monitors Brings Enhanced Security To Green Mountain
Data Protection : 17 February, 2011
Coffee Roasters Gain Granular Search Capability As Part Of Its Security Information and Event Management System from NitroSecurity
Hardware Security Modules Meet NIST Cryptography Requirements
Data Protection : 16 February, 2011
Best practice guidelines from the National Institute of Standards and Technology for cryptographic algorithms are fully met by hardware security modules from Thales
Partnership Results In Hardware Encrypted Secure USB Drive
Data Protection : 16 February, 2011
BlockMaster has unveiled a new product at the RSA Conference for encrypted secure data storage on USB resulting from the company's partnership with Kingston Digital
HDD Manufacturer Parterns With DES For Disk Protection
Data Protection : 16 February, 2011
DESlock+ licences will be supplied for system protection to purchasers of CnM Core external hard disk drives
Managed Tokenisation Service For Personally Identifiable Information
Data Protection : 16 February, 2011
Cloud based tokenisation as a service offering from nuBridges brings improved security and compliance for electronic health records and personally identifiable information
High Performance Enpoint Protection For Virtual Environments
Data Protection : 16 February, 2011
Symantec has re-released two versions of the company's Endpoint Protection product with faster performance and advanced protection for endpoints
Integrated Vulnerability Scanner For Database Security Manager
Data Protection : 15 February, 2011
At version 4.1, LogLogic's Database Security Manager improves insight into database user activities and scans for potential security weaknesses
SMS Authentication Added To PINsafe
Data Protection : 15 February, 2011
Authentication technology from Swivel Secure gains additional functionality at v3.8 including in-bound SMS authentication capability
Management of Privileged Sessions Reduces Insider Threat
Data Protection : 15 February, 2011
Cyber-Ark releases the Privileged Session Management Suite for protection of data assets and servers from a range of security threats
RSA Integration Demonstration for Access Assurance Suite
Data Protection : 14 February, 2011
Courion is attending the RSA Conference in San Francisco this week where it will be demonstrating the integration of the Access Assurance Suite with RSA solutions
A Fifth Of Commercial IT Attacks Come From Insiders
Data Protection : 11 February, 2011
CyberSecurity Survey reveals that over 20% of attacks on organisation's IT systems originate from people who have some form of authorised access, whether as employees or contractors
Data Protection Software For Sensitive Data Held In Files And Applications
Data Protection : 11 February, 2011
Data Security Platform 5.5 from Protegrity enables personally identifiable information to be protected using tokenisation
Two Factor Authentication Using Mobile Phone The Right Move For Google
Data Protection : 11 February, 2011
Tenable Network Security takes a positive view of Google's move into two factor authentication using mobile phones as the token
Trusted Client Provides Answer To New US Teleworker Legislation
Data Protection : 11 February, 2011
As the new Teleworker Bill comes into force in America, Becrypt is providing Trusted Client enabling workers to operate remotely from the office in a secure environment
Intel IPT Can Now Have Digipass Embedded
Data Protection : 11 February, 2011
Vasco Digipass can now be used as an embedded token in Intel's Identity Protection Technology for strong authentication
USB Computing Security Innovations To Be Unveiled At RSA Conference
Data Protection : 11 February, 2011
BlockMaster has joined forces with Ceedo to develop technology for managing the security of USB attached devices to be unveiled in San Francisco at the RSA Conference
PINsage Plug-in For Windows Credentials
Data Protection : 10 February, 2011
Users of Microsoft enhanced authentication functionality for Windows can now make use of PINsafe multi-factor authentication technology from Swivel Secure
Free Encryption Software For Home Users
Data Protection : 10 February, 2011
DESlock+ personal edition from Data Encryption Systems is now available free to home users with additional features also available for improved removable media encryption ot DESlock+ Standard Edition licence holders
ITAC Comments On Identity Theft Reduction Report
Data Protection : 10 February, 2011
The Identity Theft Assistance Centre advises continued vigilence and increased efforts in the fight against identity theft whilst incidences are reducing
Commercial Funding Shortfall Leaves Database Security Lacking
Data Protection : 10 February, 2011
Joint report co-authored by Application Security finds there is a lack of funding and support for IT organisations wanting to improve database security
First | Prev  | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo