Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
A point to point protocol which allows the direct connection of two computers for the purposes of file sharing or messaging. It is a software protocol analogous to a pipe built in software that establishes a constant connection. This is often used in Instant Messaging applications and compromises the security features built into networks based on other protocols. Many IM users within companies are unaware of the security risks involved and if IM's are not blocked or protected, they form a significant security risk to organisations.
Unified security platform enhancements
Access control and surveillance integration as well as a new disaster recovery mode characterise the latest release of Genetec Security Center at version 5.5
Mobile point of sale security for Middle East
Hardware security modules from Thales e-Security are being used by payment technology company for mobile card payments in the UAE
Improved network visibility and security at Norwich School
ForeScout CounterACT is providing the independent Norwich School with network visibility, regulatory compliance and potential breach mitigation
Payment card industry compliance consultancy available
Foregenix is offering a free service to provide consultancy on meeting Payment Card Industry standard compliance
Productivity app download milestone for forensic software
Users of EnCase digital forensics software have performed over 50 thousand downloads of the EnScript productivity apps from Guidance Software's online store
P2PE certification ensures security of cardholder data
Payment card industry certification from Foregenix for point-to-point-encryption (P2PE) applications adds confidence in protective capabilities for cardholder information
IT security discounts available for UK education sector
Educational institutions in the UK can benefit from the Education Discount Policy being offered on IT security products by Cyberoam
Analysis of spam environment in February
Kaspersky Lab releases its analysis of spam during February with Valentine's day exploitations featuring highly both in e-mail and on social networks
Mobile device threat complexity sees annual growth
Threat report from Webroot features the growth in mobile threats exposing company IT systems to malicious attacks
IT threat predictions for 2014
Fortinet is predicting Android malware on Industrial Control Systems as one of the key threats to watch out for in 2014
Point-to-point encryption certification for Verizon
PCI specialist company gains certification on point-to-point encryption enabling it to assist customers in the payment card industry to become compliant
Tamper-proof jailbreak detection for mobile devices
Designed for mobile devices used in enterprise environments, new jailbreak detection software protects companies from fraud and data loss
UK businesses concerned over security complexity
A survey by Check Point reveals the concerns held by UK businesses over the increasing complexity of security
Data discovery experts present at PCI Seminar
Foregenix is attending the PCI Seminar in South Africa this year to discuss the role of data forensics and discovery in protecting card payment transactions
Mobile wallet vulnerability discussed at Cartes 2012
The French Cartes 2012 conference in Paris was attended by ValidSoft, discussing the heightened risks to users of mobile phones as a payment token
Managed Card Payment Service With Latest PIN Pads
Approval has been given to Anderson Zaks for the transaction ready payment service it provides
Spam Becomes Less But More Malicious
A study from BitDefender has shown that the reducing levels of spam hides a trend for messages to be more malicious in their nature
Arxan Addresses Financial Services Event With Mobile Security
Specialists from mobile security company Arxan are attending the Florida Financial Services Summit to demonstrate and explain security for mobile devices
Higher Levels Of Hacking Attacks Against Retailers
Dell Secureworks reports on the high levels of web exploit and SQL injection attacks targeted at the retail trade industry
EPolicy Orchestrator Certification for CounterACT
Forescout's network access control product has been certified as compliant with McAfee's ePolicy Orchestrator
Remaining Compliant With PCI DSS 2.0
SecureTrading explains how to keep on top of compliance with the latest iteration of the Payment Card Industry data security Standard
PDF Exploits Continue To Cause Problems In February
The GFI Software ThreatNet statistics for February reveal continuing Trojan exploits and problems with PDF vulnerabilities
Kaspersky Reports On Threat Evolution During 2010
With eight times more attacks online during 2010 than the previous year, Kaspersky looks at the causes of this growth more closely
Illegal File Sharers Waiting Prosecution Must Face Legal Action
FAST is calling on the British justice system not to fold under campaign to withdraw cases from the legal process
Automating Encryption Key Management
Gregory Webb of Venafi explains the dilemma of meeting PCI Data Security Standards whilst managing ever increasing numbers of encryption keys and certificates, a process that can be automated to provide a consistently secure environment
Free Anti-Virus Software For Mac Home Users
Responding to increased threats against Mac users, Sophos has released Anti-Virus Home Edition which is available free of charge
Human Factors Prevail In Data Loss Incidents
Alexei Lesnykh of DeviceLock puts recent data loss incidents and industry reports into perspective and suggests the human factor is predominant in the prevention of losses in an industry where IT has become consumerised and cyber-criminals are become more focused in their targets
Banking Industry Relies On Accellion Secure File Transfer
Secure File Transfer management from Accellion enables financial institution employees to share files in a secure manner
Programme To Facilitate Safe Academic File Transfers
With the new term beginning, Accellion is helping schools and other academic institutions become aware of the secure methods of transferring files
Avast Issues Warning on Most Infected Sites
Spoof sites and small businesses targeted in campaign to infect UK based website warns Avast
File Sharing In Virtual Environments
Accellion's managed file transfer system is now available with support for the Citrix XenServer bringing secure file sharing to the Citrix virtual environment
Phone Protection and NFC Come Under The Spotlight At CARTES and Identification 2010
Smart card industry event to be held in December will focus heavily on the rising concerns of mobile telephone protection with particular emphasis on the use of these devices for payment services with the advent of Near Field Communications technology
Press Recognition For InstaGate from eSoft
The InstaGate 806 Security Gateway receives 5 star rating from IT Pro for performance in web filtering and intrusion prevention
Secure Mobile Corporate Desktop with Abra USB Appliance
Check Point Software brings more scope to mobile users with a USB device enabling VPN connectivity, strong authentication and encrypted storage which allows secure use of corporate desktop environments whilst on the move
Commercial Justification for IP Network Security Assurance
Rajesh Talpade, PhD, Chief Scientist and the IP Assure Product Manager at Telcordia examines the "low high contradiction" of balancing cost and control when specifying IP Assurance requirements
Small Businesses See Web 2.0 As The Greatest Threat for Malware Delivery
Social Networking and Web 2.0 applications are seen as the biggest threat posed to Small and Medium Sized Enterprises for the spread of malware according to survey from Webroot
UTM Price Reductions Through New Licensing Models
Unified Threat Management technology available to a wider audience as Astaro brings pricing model in line with requirements of smaller businesses
FAST comments on litigation risk for companiestest ignoring employee download activity
With ScanSafe research indicating large growth in the use of employee workstations for the illegal downloading of software and other materials, The Federation Against Software Theft is advising companies that they face prosecution for allowing this to take place on work premises
Multicultural London University takes ForeScout network access control
The London South Bank University has chosen to use ForeScout's CounterACT network access control product to enforce user policies and protect its networks
Small business IT security for multiple platforms
Security Suite Small Business Edition Version 4.0 from Sophos includes SafeGuard encryption and supports Windows 7 and Snow Leopard
Managed service available for Palo Alto firewalls
Using the next generation enterprise firewalls from Palo Alto Networks, managed service offered by ITC Global Security brings enhanced levels of visibility and control to network administrators enabling control of users, applications and content
Full protection against latest network and application threats
WatchGuard XTM 8 Series provides Unified Threat Management protection to enterprises from the latest malware technology without compromising network performance
P2P Monitoring assists in removing network vulnerabilities
Gartner report highlights the role played by Tiversa in providing tools for monitoring P2P file transfers over public networks and reducing data leakage
Network Box guide to forgotten security defences
SQL Injection attacks and the vulnerability of P2P add-in applications are the subject of advice from Network Box in its "forgotten security defences" information series
Free business firewall offered by Astaro for VMware
Communication protection between virtual machines is being offered free of charge at a basic firewall level to companies operating VMware
P2P poses serious security risk to businesses
Network Box has published a free guide to safeguarding enterprise networks from the threats posed by allowing employees peer-to-peer technology
Sunbelt reaches technology agreement with Facetime
Sunbelt Software and Facetime Communications reach licensing agreement for the security of Web 2.0 and social networking
CounterStorm protects from targeted and zero day attacks
Trusted Computer Solutions launches CounterStorm for the rapid and accurate detection of zero day threats
Security suite for Windows 7
Outpost 2009 is available in Beta for providing firewall and antivirus protection for systems operating in a Windows 7 environment
Government network protection at American Systems
US IT support and consultancy support company for Government departments takes CounterACT network access control from ForeScout
First | Prev  | 1 | 2 | 3  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo