Information Security



Securing SAP financials
1 November 2013, Access Control & Identity Management, Infrastructure
Bytes, in partnership with Realtime, now offers enterprises Biolock, which is the only biometric identity and access management software certified by SAP.

Read more...
The dark side of cloud
October 2013
Cloud concepts certainly make for a very good debate and challenge most of our paradigms in business today. But there are important issues one must take into consideration before simply signing up.

Read more...
Securing VoIP
October 2013, MiRO
Hi-Tech Security Solutions spoke to Chris Sutherland, brand manager for Miro to find out more about VoIP as well as the security implications of using this technology.

Read more...
Top 10 security best practices for SMBs
October 2013
Cybercrime in South Africa is increasing at epidemic proportions and small to medium businesses have turned into key targets for cyber-criminals. Small businesses rarely recover from cyber-attacks, but there are some very simple steps you can take to protect your business.

Read more...
IT security is critically underfinanced by business
1 October 2013
53% of South African based IT decision makers feel that not enough time or money is available to develop IT security policies. These findings emerged from the recent Global Corporate IT Security Risks 2013 survey conducted by B2B International for Kaspersky Lab in 2013 among business representatives around the world.

Read more...
Cost saving network for municipality
September 2013, MiRO
The Radwin 5000 base stations are optimised for corporate access, video transmission and backhaul applications and were the ideal solution for this municipal installation.

Read more...
Don't underestimate malware
September 2013
Most companies greatly underestimate the number of new malicious programmes appearing daily, and only 6% recognise the true scale of the threat, according to the 2013 Global Corporate IT Security Risks survey.

Read more...
Retail risk through POS systems
September 2013, Retail (Industry)
McAfee has released Retail Reputations: A Risky Business, a report on the growing risks the industry is facing with both legacy and newer point of sale systems (POS).

Read more...
Managing mobile security in South Africa
August 2013
Sensitive corporate information can be easily transported, leaked, or lost while the Bring Your Own Device (BYOD) movement has dramatically increased the number of expensive security incidents.

Read more...
Big data comes to security
August 2013
RSA Silver Tail introduces big data visualisation and click-by-click threat scoring.

Read more...
Securing iOS and Android in the enterprise
August 2013
Secure Work Space separates work and personal apps and data on iOS and Android devices without sacrificing the user experience.

Read more...
The complex cloud security conundrum
July 2013, Technews Publishing
Hi-Tech Security Solutions delves into the complex and popular world of cloud computing with a view to understanding the security implications of this trend.

Read more...
Who is watching your data?
July 2013
Information theft is the most profitable crime in the world today.

Read more...
Emulating the enemy
July 2013
Threat emulation is a critical ­technique in achieving more effective network security. Doros Hadjizenonos, sales manager at Check Point South Africa explains why.

Read more...
Secure wireless LAN solution
July 2013, Products & Solutions
Fortinet has released its new secure wireless LAN solution specifically designed for distributed enterprises. The Fortinet Secure WLAN integrates wireless and wired access, security, authentication, switching ...

Read more...
Hardened video encoder/decoder
July 2013, Products & Solutions
ComNet Europe is introducing a video encoder/decoder designed for those applications where temperature extremes, vibration, shock, voltage transients, and humidity with condensation are present. The new CNVETX1 video encoder/decoder is industrially hardened for use in the most extreme operating environments.

Read more...
Of security and open source software
July 2013
When it comes to open source software … are you more or less secure?

Read more...
New model for consumer security
1 July 2013
McAfee launches unlimited cross-device security service with facial and voice recognition for consumer devices.

Read more...
Financial institutions gamble with information security
1 July 2013, Financial (Industry)
Lack of security specialists lead to high risk, quick fix security solutions.

Read more...
Mining the cloud for security
1 July 2013
Cloud-based solutions embracing endpoint protection, e-mail security and systems management.

Read more...



<< First   < Previous   Page 54 of 85   Next >   Last >>