Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
IT Security
Could wearable technology pose a threat in the workplace?
Network Security, Routers and Data Centres : 16 February, 2015
Alessandro Porro of Ipswitch discusses the predicted increase in wearable technology and what this could mean to the cyber threat landscape in the workplace
Dutch DDoS event demonstrates economic asymmetry of cyber attacks
Data Protection : 16 February, 2015
Thales UK comments on the ability for low-cost IT tools to be used to create economic havoc in commercial and administrative organisations
A billion data records compromised during 2014
Anti-virus and anti-malware software : 16 February, 2015
The 2014 Breach Level Index from Gemalto shows an almost fifty percent increase in data breaches to over 1 billion compromised records
Adaptive threat protection from multiple sources
Anti-virus and anti-malware software : 16 February, 2015
Tripwire's Adaptive Threat Protection product has been expanded to incorporate more sources of threat information
Large contactless payment card deployment in South American universities
Finance and Banking Security : 12 February, 2015
A Brazilian bank is at the forefront of a deployment of contactless EMV cards to students in universities in Brazil
Device based two factor authentication
Authentication : 12 February, 2015
Authentication service from iovation uses known laptops and smartphones as a means of verifying user authentication
NAC distribution agreement extended to the UK
Network Security, Routers and Data Centres : 12 February, 2015
ForeScout has extended its value-added distribution agreement with Arrow to encompass the UK and Ireland as well as the DACH region
Securing digital identities amongst the Internet of Everything
Data Protection : 11 February, 2015
Neil Chapman, Senior Vice President & Managing Director EMEA at ForgeRock delves into identity management and security in connected home and lifestyle electronics
Cloud based mobile access partnership
Mobile computing security : 11 February, 2015
MeaWallet is partnering with Safe4 Security Group to bring cloud based mobile access control products and services to the Nordic Market
Roaming threat protection on mobile networks
Network Security, Routers and Data Centres : 11 February, 2015
GRX Security Gateway from Clavister enables mobile operators to protect against threats to GPRS roaming exchange networks
Controlled secure file sharing for university data
Network Security, Routers and Data Centres : 11 February, 2015
Varonis has supplied Liverpool University with DataAnywhere to enable controlled and secure remote data storage for file sharing without using insecure public cloud services
Continuous monitoring and mitigation protects European digital classified ads platform
Network Security, Routers and Data Centres : 11 February, 2015
European home and vehicle classified ads platform provider selects CounterACT from ForeScout Technologies for improved network endpoint visibility and management
Anthem attack demonstrates need for more than static defence
Data Protection : 09 February, 2015
Jonathan Whitley of WatchGuard explains the improvements needed to corporate IT defence mechanisms to become more effective against Anthem-style attacks
Managed keys for customer control of cloud encryption
Data encryption : 09 February, 2015
Individual customized control over access to different elements of cloud data through encryption keys provides better business specific access control and management
Ghost vulnerability on legacy Linux platforms
Anti-virus and anti-malware software : 09 February, 2015
Veracode releases statistics on the vulnerability of Linux systems to the Ghost vulnerability providing remote control
Missing patch detection and vulnerability assessment scanning
Anti-virus and anti-malware software : 09 February, 2015
The latest version of LanGuard from GFI Software provides companies with improved network device vulnerability assessment including the detection of missing patches
Network security eBook examines UTM
Unified Threat Management : 06 February, 2015
WatchGuard Technologies has published an eBook to provide companies with information on how to use Unified Threat Management to future-proof their network security
Survey probes data security in education sector
Data encryption : 06 February, 2015
A study from iStorage shows that lack of encryption on portable storage devices is putting sensitive education sector data at risk from exposure
Security company examines online dating fraud
Data Protection : 06 February, 2015
iovation provides details of the latest trends in online dating fraud and what consumers and businesses need to look out for to identify potential scams
Malicious adware continues to plague Android apps
Mobile computing security : 06 February, 2015
Webroot comments on the recent withdrawal of a number of Android apps from Google Play amid problems of adware infections on mobile devices
Firewall for VMware virtualised environments
Network Security, Routers and Data Centres : 06 February, 2015
Network security experts at Fortinet have joined the VMware NSZ partner programme and produced the FortiGate-VMX Firewall for virtual environments
NG firewalls provide hockey fans with secure internet access
Network Security, Routers and Data Centres : 04 February, 2015
The Swedish Hockey League is using Clavister's security gateway to enable network segregation and give fans access to online services
Analyst portal provides improved decision making
Data Protection : 04 February, 2015
Investigation and resolution of cyber threats gains a new dimension with the Analyst Portal from Tier-3 Huntsman for improved decision making
Risk management with advanced threat analytics
Data Protection : 04 February, 2015
Management and analytics console provides IT security managers with advanced threat detection capability to identify data breach threats
Study charts enterprise cloud usage risks
Cloud Computing Security : 04 February, 2015
CipherCloud has released its cloud adoption and risk report detailing the usage trends of cloud computing for US and European enterprises
UK telecom company software ensures payment card compliance
Payment cards and e-commerce security : 04 February, 2015
BCH Digital ensures the compliance of its hosted telephone card payment service with the PCI DSS standard using software from New Net Technologies
Google data privacy policy re-write an example for all
Data Protection : 03 February, 2015
Sue Trombley of Iron Mountain explains the implications of the ICO's pressure on Google to re-write its data privacy policy
Network Access Control market report recognises ForeScout as having largest deployments
Network Security, Routers and Data Centres : 03 February, 2015
ForeScout Technologies recognised in Network Access Control report for platform versatility and number of endpoints protected
Threat of increased untrusted certificate use
Anti-virus and anti-malware software : 02 February, 2015
Kaspersky Lab explains the dangers of untrusted certificates and their increased use in the launching of malicious software
Award recognition for anti-virus product
Anti-virus and anti-malware software : 02 February, 2015
AV-Comparatives have chosen Bitdefender for its product of the year title for the second year in succession
Beyond access control with next-generation NAC
Network Security, Routers and Data Centres : 02 February, 2015
Fran Howarth, senior analyst for security at Bloor Research explains how next-generation Network Access Control (NAC) is capable of defending against rogue users, devices and applications
The real consequences of a DDoS attack
Anti-virus and anti-malware software : 30 January, 2015
Kaspersky Lab explains how a DDoS attack can have serious financial and operational consequences on the target organisation
Central management and application control on new firewall
Network Security, Routers and Data Centres : 29 January, 2015
The latest addition to Clavister's Wolf series of firewall appliances provides full control and management for entry-level enterprise security
Privileged account management growth in 2014
Authentication : 29 January, 2015
BeyondTrust reflects on a year of growth during 2014 in both privileged account and vulnerability management as customer demand increases
DDoS Security as a Service implementation
Data Protection : 28 January, 2015
Joe Eskew of NSFOCUS explains the three steps required for implementing DDoS Security as a Service technology for protection against attacks
Continuous recording capability for endpoint threat detection
Anti-virus and anti-malware software : 28 January, 2015
The latest release of Carbon Black provides continuous endpoint recording and live incident response through remote connection throughout the enterprise
Research into social media use in education
Internet Security and Content Filtering : 28 January, 2015
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments
Higher education IT security recognition for two products
Network Security, Routers and Data Centres : 28 January, 2015
CounterACT and ControlFabric have achieved recognition for successful deployment within higher education
Skimming detection device for ATMs
Finance and Banking Security : 23 January, 2015
A bank in Qatar is now able to detect card skimming attempts as well as capturing a facial image of the culprit using new software from iOmniscient
Secure billing system for digital magazine distributor
Payment cards and e-commerce security : 23 January, 2015
French distributor selects Netsize from Gemalto for secure online billing operations for digital downloads using mobile payments
Secure online services for Turkish bank
Finance and Banking Security : 23 January, 2015
Halkbank of Turkey is improving security for its internet and mobile banking clients with the introduction of security technology from Kobil Systems
Can biometrics replace passwords
Authentication : 22 January, 2015
Infobip explains the role of biometrics as a secure authentication method if used with a second identification factor
Data centre migration challenges
Network Security, Routers and Data Centres : 22 January, 2015
Security and compliance feature in the key three considerations for successful migration of data centres
Reducing enterprise password management risk
Data Protection : 22 January, 2015
Pooled service account rotation feature in Enterprise Random Password Manager reduces risks and disruptions when dealing with privileged accounts
Enhanced cyber threat detection and response
Data Protection : 22 January, 2015
New Case Management and advanced search features provide IT security personnel with improved detection and response capabilities for cyber threats
Secure payment platform for non-profit market
Payment cards and e-commerce security : 20 January, 2015
Security-as-a-Service platform from Alert Logic will protect large volumes of online transactions being performed by Valldata for the non-profit segment in the UK
Leaked picture fraud takes hold on Facebook
Internet Security and Content Filtering : 19 January, 2015
Bitdefender is warning users of social network sites not to be duped into falling for the latest viral or trending snapchat leaks
Device sharing risk for mobile users
Mobile computing security : 19 January, 2015
Survey results show mobile device owners are taking considerable risks in openly sharing their internet enables smartphones and tablets
Modular Tier III data centre to be built in The Netherlands
Network Security, Routers and Data Centres : 15 January, 2015
Datacentre design and operating company, ICTroom will provide a modular, Tier III facility for Cegeka to be operational in June this year
Social media security compliance for business networking site
Anti-virus and anti-malware software : 15 January, 2015
Business social media networking site, LinkedIn has chosen Proofpoint to become a certified compliance partner for the protection of branded accounts
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo