Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
IT Security
Access and mobile security expansion in Europe
Network Security, Routers and Data Centres : 29 May, 2015
Pulse Secure has its debut this year at the InfoSec Europe event as the company progresses its expansion into the EU region
Malicious iPhone attack messages blocked
Mobile computing security : 29 May, 2015
Over a million messages threatening to attack iPhone equipment in the USA have been blocked by mobile security software from AdaptiveMobile
SSD storage for industrial and commercial use
Data Protection : 27 May, 2015
The latest solid state drives from SanDisk can replace hard drives in many commercial and industrial embedded computing systems such as signage
Rationalising the network at large European print supplier
Backup, Data Recovery and Disaster Recovery : 27 May, 2015
Barracuda Networks has helped Papergraphics to rationalise its network over multiple remote locations to integrate backup, archiving and network security
Cloud based interactive application security testing
Internet Security and Content Filtering : 26 May, 2015
Partnership between Veracode and Contrast Security brings interactive application security testing into the cloud as an automated service
White paper illustrates how essential security is being overlooked
Network Security, Routers and Data Centres : 26 May, 2015
Swivel Secure investigates the vulnerability of corporate networks to cyber attacks with IT departments overlooking essential security measures
Aerospace company deploys secure VPN
Network Security, Routers and Data Centres : 26 May, 2015
France based Airbus subsidiary secures its international partner communications using virtual private network with VoIP capability from Interoute
Considerations for taking out cyber insurance
Internet Security and Content Filtering : 20 May, 2015
Charles Sweeney, CEO of Bloxx, examines the case for commercial cyber liability insurance and what steps companies can take to reduce risk and premiums
Android protection for Korean mobile payment specialist
Finance and Banking Security : 20 May, 2015
Intercede has supplied Interpay with the MyTAM platform for providing payment security and malware protection for Android users of the mobile payment system
Protection of information from visual hacking
Data Protection : 20 May, 2015
Peter Harley of 3M explains how companies could be losing information through leaving screens exposed to people able to see content over the users shoulder
Skill shortage for information management
Data Protection : 20 May, 2015
Survey from Iron Mountain reveals the extent to which business leaders are facing a skills shortage in the UK for critical information management
BYOD risks overlooked by smaller businesses
Mobile computing security : 19 May, 2015
Research from Kaspersky Lab shows almost a third of small UK businesses fail to see any threat in employees using their own mobile devices
EU General Data Protection Regulation still misunderstood by many
Data Protection : 12 May, 2015
A survey at Counter Terror Expo has revealed the level of misunderstanding that still exists amongst UK businesses of the forthcoming EU General Data Protection Regulations
Security seal denotes manually pen tested sites
Internet Security and Content Filtering : 12 May, 2015
Web sites and applications which have been manually penetration tested can now be distinguished from other by the ImmuniWeb Security Seal
Key European sales appointments for data centre company
Network Security, Routers and Data Centres : 08 May, 2015
ICTroom hires bolsters European sales growth with two new appointments covering the UK, Ireland and the DACH region
Secure storage ready for Windows 10
Data encryption : 08 May, 2015
Windows 10 ready IronKey devices can now be configured and integrated in batches for easier deployment for secure enterprise storage
Chief Strategy Officer to lead new phase of growth
Network Security, Routers and Data Centres : 08 May, 2015
Network security company hires Chief Strategy Officer to provide leadership into the next growth stage in line with corporate strategy
Cloud authentication using NFC devices
Authentication : 06 May, 2015
ActivID Tap Authentication provides multi-factor credentialling for users of Microsot Office 365 and other cloud apps and services
Wristbands enable secure contactless payment
Payment cards and e-commerce security : 06 May, 2015
Rugby Union fans and guests of the Saracens can use contactless payments at their London stadium thanks to the use of secure wristbands
Web application scanning acquisition
Internet Security and Content Filtering : 06 May, 2015
Rapid7 takes over NT Objectives bringing latest web application scanning tools into the company portfolio
Communication Session Controllers with Skype for Business enabled
Network Security, Routers and Data Centres : 06 May, 2015
Sonus software upgrades for real time IP communications now enable Skype for Business to be used
ForeScout joins Society of IT Management as silver partner
Network Security, Routers and Data Centres : 06 May, 2015
Public sector IT management group welcomes ForeScout Technologies to its membership for delivery of IT and digitally enabloed services for the public benefit in the UK
Small office IT security without the need for IT skills
Anti-virus and anti-malware software : 04 May, 2015
Kaspersky Lab is meeting the needs of smaller businesses with a special edition of Small Office Security that can be commissioned without specialist IT skills
Hardware encrypted USB storage with ePO support
Data encryption : 30 April, 2015
The latest IronKey hardware encrypted USB storage devices from Imation are compatible with McAfee's ePolicy Orchestrator platform
Insecure boardroom practices put UK companies at risk
Data Protection : 28 April, 2015
Outdated paper based information distribution and use of most insecure mobile platform categorize two elements of serious data risks faced by UK boardrooms
High performance Unified Threat Management
Unified Threat Management : 28 April, 2015
Panda Security has released two new Unified Threat Management appliances offering greater performance in data protection
Poor threat intelligence creating network and data exposures
Data Protection : 27 April, 2015
In its latest threat brief, Webroot shows the extent to which poor threat intelligence is leaving greater exposures to increased complexity of cybercrime
Fireware operating system fights cyberloafing
Internet Security and Content Filtering : 27 April, 2015
A new operating system from WatchGuard Technologies is aimed at helping companies regain productivity by reducing the time employees spend surfing the internet
Security partnerships improve threat response capabilities
Network Security, Routers and Data Centres : 27 April, 2015
Parnership expansions based on ForeScout ControlFabric bolster mitigation capabilities for advanced threats and breaches.
Encryption and Key Management trend survey results
Data encryption : 22 April, 2015
Thales and the Ponemon Institute have completed their study on global encryption trends and the use of key management
Cloud based privileged identity management service
Authentication : 22 April, 2015
Managing priviliged identities in the cloud is now possible with the release of a new service for hybrid on-premises and cloud-based systems
Vulnerability discovery in e-commerce platform
Anti-virus and anti-malware software : 22 April, 2015
Check Point discovers vulnerability affecting a popular web e-commerce platform used by online auction site
Intruder analytics integration with Office
Data Protection : 22 April, 2015
Users of Microsoft Office 365 can now gain additional protection with the ability to identify and investigate intruders with behaviour analytics
Visualisations demonstrate sophistication of banking scams
Finance and Banking Security : 22 April, 2015
AdaptiveMobile is attending the US RSA conference with demonstrations of how mobile banking attacks can have devastating effects on the US financial system
Mobile device use increases at Transport for London
Mobile computing security : 20 April, 2015
London transport provider almost doubles its use of mobile tablet devices over the last two years to streamline activities
New leadership for web security company
Internet Security and Content Filtering : 15 April, 2015
Industry expert with 20 years experience joins web security company, WhiteHat Security as its new Chief Executive
International consortium disrupts major botnet
Anti-virus and anti-malware software : 15 April, 2015
A group of IT companies led by the Interpol police service have successfully brought down the Simda botnet linking computers globally
NFC based authentication could see an end to passwords
Authentication : 14 April, 2015
SecurEnvoy is using the RSA Conference to demonstrate its prototype of single swipe authentication for Windows 10 using Near Field Communication
Secure USB promotion marks device landmark
Data Protection : 14 April, 2015
Imation is introducing a Golden IronKey programme to celebrate selling over two million secure USB memory drives
Public sector network computing award
Network Security, Routers and Data Centres : 14 April, 2015
ForeScout Technologies gains network computing award success in recognition for project at Sutton and East Surrey Water
Research reveals continued risk from heartbleed
Anti-virus and anti-malware software : 08 April, 2015
Incomplete remediation from heartbleed leaves UK companies at risk a year after the vulnerability was first recognised
Security management for Amazon Web Services
Unified Threat Management : 08 April, 2015
Unified Security Management released to provide security controls and threat intelligence for users of Amazon Web Services
Cloud security platform enhanced by technology acquisition
Cloud Computing Security : 08 April, 2015
CipherCloud has acquired cloud security analytics technology to enhance its enterprise cloud security platform
Tackling Today’s Authentication Complexities
Authentication : 07 April, 2015
Jason Hart, vice president, Cloud Solutions for Identity & Data Protection at Gemalto highlights the importance for organisations to adopt an appropriate authentication environment
Improved network visibility and security at Norwich School
: 07 April, 2015
ForeScout CounterACT is providing the independent Norwich School with network visibility, regulatory compliance and potential breach mitigation
IT security company evolution
Anti-virus and anti-malware software : 02 April, 2015
Kirill Slavin, General Manager, Kaspersky Lab UK and Ireland, explains Why diversify or die doesn’t always ring true in an ever-evolving IT security market place
Payment card industry compliance consultancy available
Software Asset Management and Compliance : 02 April, 2015
Foregenix is offering a free service to provide consultancy on meeting Payment Card Industry standard compliance
Insecure personal data on wearable technology
Mobile computing security : 01 April, 2015
Kaspersky Lab discovers security flaws exposing personal data to risk when using wearable technology for fitness assessment
Increase in cyber attacks affects all sizes of companies
Data Protection : 01 April, 2015
Darren Anstee, Director of Solutions Architects at Arbor Networks puts perspective on the cyber security landscape and shows it isn't just large companies that are at risk
Change tracking for PCI DSS Compliance
Software Asset Management and Compliance : 26 March, 2015
US IT company chooses to supply its customers with Change Tracker Enterprise from NNT for improving compliance to PCI DSS standards
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo