Managed IT security solution
March 2019, Cyber Security, IT infrastructure, Products
The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored. These vectors are as follows:
Network Edge: The LanDynamix Managed Firewall is the part of the solution that sits between a company’s network and the Internet. It plays a vital role in ensuring that attackers from the outside are not able to force their way into a network. It also prevents users from going to websites that may contain malware. Depending on how a network is set up, it can play a vital role in guaranteeing that different branches are able to be connected in a secure way and that important corporate information is segregated from personal user and guest devices. Lastly, it also helps protect a company from internal attacks and data leak prevention by giving the company the ability to block tools like, Dropbox, OneDrive and Gmail.
Endpoint: LanDynamix Managed Anti-Virus and Managed Patching solutions are two of the most important products of the stack as they protect the endpoints of a network. Gone are the days where this is a manual task which led to human error and did not provide the level of visibility needed to ensure that everything is secure. By combining proactive monitoring, automated AV deployments, preventative maintenance windows and well thought out automated managed patching cycles, LanDynamix can ensure that devices are protected at all
Mail: LanDynamix Mail Security combines advanced spam detection with sandboxing. Advanced spam detection results in a cleaner inbox. Users can also manage their own permitted and denied senders list. Sandboxing essentially opens mail and any attachments on virtual machines which run varied operating systems even before being scanned for spam. If the virtual machines detect a mail or attachment that is malicious it automatically blocks it from going through to the user.
For more information, go to www.landynamix.co.za
- 2019 Internet of Things (IoT) Barometer
March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
- Halt, who goes there?
March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.
- IoT is convergence in action
March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.
- Stop hacking of access control systems
March 2019, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.
- New cybersecurity pavilion for Securex 2019
March 2019, Securex South Africa , This Week's Editor's Pick, Cyber Security, News, Conferences & Events, Training & Education
Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...
- Keeping your guard up in retail
March 2019, Active Track, Retail (Industry), Security Services & Risk Management, Products
A security officer patrols the perimeter of a local shopping centre throughout the night, every night. During these patrols, the perimeter fence is checked, and the security officer keeps a look-out for ...
- Cash in with true identity
March 2019, Suprema, Access Control & Identity Management, Products
Cash is inherently risky, costly and easily exposed to fraud, thus necessitating the need for stronger security such as opting for the integration of biometrics into cash handling solutions.
- Security by design
March 2019, Johnson Controls, Cyber Security, Integrated Solutions
The security of the platforms on which physical security products are built will increasingly impact purchase decisions and market positions.
- A logical solution for cyber solutions
March 2019, Suprema, Cyber Security, Access Control & Identity Management, Products
BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.
- eCLIQ electronic locks
March 2019, ASSA ABLOY South Africa, Access Control & Identity Management, Products
An innovative and easy to install access control solution that offers reliable protection and maximum flexibility.
- Latent fingerprint examination system
March 2019, IDEMIA , Access Control & Identity Management, Products
IDEMIA Case AFIS revolutionises latent print examiners comparison speed, accuracy and operational quality excellence.
- 180° outdoor detectors
March 2019, Elvey Security Technologies , Perimeter Security, Alarms & Intruder Detection, Products
OPTEX has launched a new series of outdoor PIRs in EMEA (Europe Middle East and Africa) that offer 180° detection coverage and a 12 m radius to detect any intrusion around a residential or commercial building.