|
|
|
Matching security to increased network performance |
|
|
Network Security, Routers and Data Centres
: 26 March, 2015 |
Dan Joe Barry, a Vice President at Napatech, examines the need for greater focus on network performance when deploying network security systems |
|
|
|
|
 |
|
|
|
|
Financial services compliance expansion |
|
|
Software Asset Management and Compliance
: 20 March, 2015 |
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements |
|
|
|
|
 |
|
|
|
|
Three key IT security focus areas identified |
|
|
Data Protection
: 19 March, 2015 |
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Proactive document threat detection |
|
|
Anti-virus and anti-malware software
: 11 March, 2015 |
Check Point Threat Extraction takes a new approach to eliminating the threats posed by infected documents |
|
|
|
|
 |
|
|
New malware bypasses CAPTCHA |
|
|
Anti-virus and anti-malware software
: 11 March, 2015 |
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money |
|
|
|
|
 |
|
|
|
|
|
|
Key actions needed to ensure digital safety |
|
|
Data Protection
: 10 March, 2015 |
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
Centralised e-mail encryption |
|
|
Data encryption
: 05 March, 2015 |
Simplified enterprise e-mail encryption includes flexible and configurable policy settings |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Big data analytics provide network investment decision support |
|
|
Network Security, Routers and Data Centres
: 04 March, 2015 |
CommsReveal from BAE Systems is designed to provide network intelligence through big data analytics to communications service providers to enable decisions to be made on investments and network changes |
|
|
|
|
 |
|
|
Collaboration extends NFC adoption opportunities |
|
|
Mobile computing security
: 04 March, 2015 |
Virtual access, ID and other card system implementations have been simplified through a technology collaboration between NXP Semiconductors and MeaWallet |
|
|
|
|
 |
|
|
|
|
IT security and the Internet of Things |
|
|
Anti-virus and anti-malware software
: 02 March, 2015 |
Luis Corrons of Panda Security explains how the Internet of Things provides new opportunities for cyber criminals in an increasingly connected world |
|
|
|
|
 |
|
|
|
|
|
|
New CEO appointed at ForeScout Technologies |
|
|
Network Security, Routers and Data Centres
: 02 March, 2015 |
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer |
|
|
|
|
 |
|
|
Award recognition for ForeScout channel partner |
|
|
Network Security, Routers and Data Centres
: 27 February, 2015 |
High revenue growth rates in 2014 for enterprise sales has earned the 2014 ForeScout EMEA Channel Partner Award for NTT Com Security |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Device timer regulates offline use of endpoints |
|
|
Network Security, Routers and Data Centres
: 19 February, 2015 |
Absolute Computrace enables network administrators to set offline usage policies with a trace and freeze options for endpoints |
|
|
|
|
 |
|
|
|
|
|
|
Pre-infection threat detection acquisition |
|
|
Anti-virus and anti-malware software
: 19 February, 2015 |
Check Point goes to the next step of threat detection with the acquisition of a company which provides CPU-level malware prevention technology |
|
|
|
|
 |
|
|
Five steps to secure iterative software delivery |
|
|
Data Protection
: 18 February, 2015 |
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process |
|
|
|
|
 |
|
|
Cloud service for using Android trusted environment |
|
|
Mobile computing security
: 18 February, 2015 |
Android app developers requiring data protection against malware from other software loaded on devices can now make use of the MyTAM cloud service for employing on-device Trusted Execution Environment |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
First | Prev | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | Next | Last |