Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Data Protection
Nomios to market GrIDsure in French market
Data Protection : 14 October, 2009
GrIDsure and Nomios enter partnership to bring PIN and password alternative to the French data protection market
 
The risks of changing to cloud computing services
Data Protection : 13 October, 2009
Adam Bosnian of Cyber-Ark brings some clarity to the cloud by explaining some of the risks and how to minimise them by asking the right questions
 
UK firms warned to bolster their defences against cybercrime
Data Protection : 13 October, 2009
In the wake of soaring levels of Cyber-crime in Germany, Finjan is warning companies in the UK to expect a similar trend to follow there
 
Concorde Informatics to become CDP provider for SonicWALL
Data Protection : 13 October, 2009
Continuous Data Protection and Unified Threat Management Services from SonicWALL to be supplied in the UK as a service from Concorde Informatics
 
Small businesses continue to risk ID fraud exposure
Data Protection : 13 October, 2009
Symantec warns small businesses to establish better procedures for handling sensitive information and documents after Fellowes research reveals high levels of sloppy approaches to data handling in the sector
 
Recovered NHS laptops signal wake up call to data security
Data Protection : 13 October, 2009
Four laptop computers recovered using tracking systems after theft from NHS trust would have presented less risk if sensitive data hadn't needed to have been stored on them in the first place, according to Cyber-Ark
 
McAfee alliance brings huntsman to a wider user base
Data Protection : 12 October, 2009
Tier-3 has joined the McAfee Security Innovation Alliance bringing the Huntsman suite integration with the McAfee ePO platform
 
Procedural flaws cause MoD leak
Data Protection : 09 October, 2009
Imperva believes the recent leak of MoD documents onto the web resulted from poor handling procedures of old documents
 
Secure ad hoc file transfer system
Data Protection : 08 October, 2009
File Transfer Direct from Axway ensures secure transfer of files with built in data loss prevention
 
Hotmail breach compromises user password details
Data Protection : 07 October, 2009
Sophos is warning Microsoft on-line mail services to change passwords after a security breach disclosed user credentials of many users
 
Web mail server attacks demonstrate flaw in password system
Data Protection : 07 October, 2009
GrIDsure comments on the vulnerability of traditional userid and password combinations as demonstrated by the recent Hotmail information loss
 
Data Traveler USB drives Secured by Spyrus
Data Protection : 06 October, 2009
In collaboration with Kingston Digital, Spyrus brings hardware based security to Kingston Digital flash memory
 
Security assessment tool for third party data handlers
Data Protection : 06 October, 2009
The Information Security Forum responds to increased demand for third party organisations to handle sensitive data with the introduction of TPSAT, a tool developed to help companies assess the security levels of the third party
 
Enterprise USB management with enforceable policies
Data Protection : 06 October, 2009
IronKey's Enterprise Server enables companies to enforce and audit policies across the use of secure flash drives
 
Improved reporting at Business Link with dn:director
Data Protection : 06 October, 2009
Business Link West Midlands takes dn:Director from Datanomic for use with the data held on the company's CRM system
 
Intercept cloud specialist takes on 2FA from CryptoCard
Data Protection : 05 October, 2009
Passwords as a service added to cloud computing specialist portfolio with the introduction of the Crypto-Mas authentication service to its offering
 
Data Loss Prevention for EBS Building Society
Data Protection : 02 October, 2009
Irish building society chooses Check Point Media Encryption to prevent the loss of confidential data from removable media and mobile computer systems
 
Centralised managed file transfer with Inter-Business Vault
Data Protection : 01 October, 2009
Secure and efficient file transfer processes are available from Cyber-Ark with Inter-Business Vault bringing built-in security to transfer systems
 
Practical advice on avoiding the insider threat
Data Protection : 30 September, 2009
Adam Bosnian of Cyber-Ark Software looks deeper into the insider threat, whether malicious or unintentional, and offers 5 best practice guidelines on how to avoid this common cause of data loss
 
Encryption ÃÂÃâ€ÂÃâÅ" belting up your data for its journey
Data Protection : 29 September, 2009
Andy Cordial of Origin Storage explains the importance of encrypting data on the move to prevent it from falling into the wrong hands
 
Ambulance service prevents data leakage with BlockMaster
Data Protection : 28 September, 2009
300 SafeStick secure USB memory devices are being supplied to West Midlands Ambulance Service to provide its staff with the flexibility of mobile data without the security risks
 
Improved transfer rates with USB 3.0 standard
Data Protection : 28 September, 2009
The flood of USB 3.0 devices expected to hit the market by the end of the year is welcomed by Origin Storage who believes it will herald a new era of secure portable storage and an end to eSATA
 
Understanding the legal risks of data loss
Data Protection : 25 September, 2009
Bernard Parsons of BeCrypt provides some insight into data loss and the legal consequences for companies and individuals who don't take substantial protective measures against it
 
Cybercrime report shows rebound in levels of online criminal activity
Data Protection : 25 September, 2009
The UK cybercrime report from Garlik shows economic changes in the country have led to a reversal of online criminal activity levels to new heights not seen since 2006
 
Oil company secures endpoints with DeviceLock
Data Protection : 25 September, 2009
Russian oil giant Gazprom Neft has chosen to protect its extensive network of endpoints from data leakage and trace user access to peripheral devices
 
Gonzalez trial testifies to need for information asset protection
Data Protection : 25 September, 2009
Electronic Verification Systems comments on the trial of US hacker, Albert Gonzalez and the implications to businesses to protect themselves from wire fraud
 
Automatic removable media encryption
Data Protection : 24 September, 2009
The Secure Data Sharing System from HitachiSoft encrypts data on removable storage providing protection for mobile data
 
Growth ranking position for Becrypt
Data Protection : 24 September, 2009
High level encryption company reaches 45th position in the Sunday Times Technology 100 tracking for growth in private technology companies
 
P2P Monitoring assists in removing network vulnerabilities
Data Protection : 22 September, 2009
Gartner report highlights the role played by Tiversa in providing tools for monitoring P2P file transfers over public networks and reducing data leakage
 
PGP comments on Conservative data privacy plans
Data Protection : 18 September, 2009
Proposal for more power to the Information Commissioner's Office to penalise organisations for the loss of private data welcomed by PGP
 
ID theft monitoring through dedicated website
Data Protection : 18 September, 2009
ITAC is offering six months of ID theft monitoring without cost to users of the Prevention Quiz launched on its web site
 
WebCard Loyalty gains IDDY award
Data Protection : 17 September, 2009
The Identity Deployment of the Year Award for 2009 has been awarded to fun communications for its virtual loyalty and bonus card issuing system based on digital identities
 
DataPatrol identity protection for Sky subscribers
Data Protection : 17 September, 2009
Sky's Identity Patrol package now includes DataPatrol from Garlik to enable subscribers to take a proactive approach to protecting their personal and financial information from fraud or identity theft
 
Mobile data loss prevention webinar
Data Protection : 17 September, 2009
DeviceLock is presenting a webinar later this month on the protection of corporate end points from data leakage
 
Securing privileged identity white paper
Data Protection : 17 September, 2009
Automated and manual methods of controlling privileged access are highlighted in four key steps in a white paper on securing privileged access released by Lieberman Software
 
ArcSight CEF certification for GuardIT
Data Protection : 17 September, 2009
Arxan's GuardIT product for software application protection from tampering has gained CEF certification from ArcSight
 
New corporate image focuses on identity
Data Protection : 16 September, 2009
ActivIdentity has chosen to strengthen it's corporate image with changes that reflect the company's focus on its core expertise in strong authentication
 
EAL 3 certification for Datacryptor
Data Protection : 16 September, 2009
Hardware based network encryptor from Thales receives Common Criterea Assurance level 3 certification
 
Gartner recognition for Becrypt
Data Protection : 16 September, 2009
Becrypt recognised for its penetration into the niche market of mobile computing data protection
 
Hardware security modules for Oracle Database 11g
Data Protection : 15 September, 2009
Thales nCipher HSMs provide centralized encryption key management and FIPS validated key storage for Oracle 11g Release 2
 
Simultaneous application and data protection
Data Protection : 15 September, 2009
Agilent Technologies security architect recently interviewed by Imperva on the next level of security integration through the simulations protection of applications and data
 
Hydra PC cryptographic module gains level 3 FIPS certification
Data Protection : 11 September, 2009
Highly secure USB flash drive supporting all suite B cryptographic algorithms receives FIPS validation
 
SuccessCloud users protected with Ping Identity SSO
Data Protection : 11 September, 2009
SuccessFactors cloud applications can now be accessed directly from corporate networks with single sign on authentication supplied by Ping Identity
 
SecureLogin 7 enterprise single sign on from Novell
Data Protection : 10 September, 2009
Novell has drastically reduced the implementation time for its enterprise single sign on solution with the release of version 7 of SecureLogin
 
EToken Pro and Smartcard gain FIPS certification
Data Protection : 10 September, 2009
Java-based USB based eToken PRO and the eToken PRO smartcard from SafeNet have achieved FIPS 140-2 certification
 
Technical certification for Tufin channel partners
Data Protection : 09 September, 2009
Enhancements to partner program including Tufin Certified Security Expert training and certification program reflects increased commitment to the channel from Tufin Technologies
 
Business Development Manager to drive growth at Security IP
Data Protection : 08 September, 2009
Security IP has embarked on its next phase of growth through the key appointment of a Business Development Manager
 
VMworld award for virtual data protection suite
Data Protection : 07 September, 2009
The vRanger Pro 4.0 Data Protection Platform from Vizioncore gains the Best of VMworld gold award from the conference's media partner
 
Strong authentication across multiple applications
Data Protection : 07 September, 2009
SafeSign Single Sign On provides a streamlined access and ID management system for strong authentication over different applications
 
Identity management specialists working with Kantara eGovernment group
Data Protection : 07 September, 2009
Ping Identity is working with the Kantara Initiative to establish internet identity security standards for eGovernment projects
 
First | Prev  | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo