Securing SAP financials 1 November 2013, Access Control & Identity Management, Infrastructure Bytes, in partnership with Realtime, now offers enterprises Biolock, which is the only biometric identity and access management software certified by SAP.
The dark side of cloud October 2013 Cloud concepts certainly make for a very good debate and challenge most of our paradigms in business today. But there are important issues one must take into consideration before simply signing up.
Securing VoIP October 2013, MiRO Hi-Tech Security Solutions spoke to Chris Sutherland, brand manager for Miro to find out more about VoIP as well as the security implications of using this technology.
Top 10 security best practices for SMBs October 2013 Cybercrime in South Africa is increasing at epidemic proportions and small to medium businesses have turned into key targets for cyber-criminals. Small businesses rarely recover from cyber-attacks, but there are some very simple steps you can take to protect your business.
IT security is critically underfinanced by business 1 October 2013 53% of South African based IT decision makers feel that not enough time or money is available to develop IT security policies. These findings emerged from the recent Global Corporate IT Security Risks 2013 survey conducted by B2B International for Kaspersky Lab in 2013 among business representatives around the world.
Cost saving network for municipality September 2013, MiRO The Radwin 5000 base stations are optimised for corporate access, video transmission and backhaul applications and were the ideal solution for this municipal installation.
Don't underestimate malware September 2013 Most companies greatly underestimate the number of new malicious programmes appearing daily, and only 6% recognise the true scale of the threat, according to the 2013 Global Corporate IT Security Risks survey.
Retail risk through POS systems September 2013, Retail (Industry) McAfee has released Retail Reputations: A Risky Business, a report on the growing risks the industry is facing with both legacy and newer point of sale systems (POS).
Managing mobile security in South Africa August 2013 Sensitive corporate information can be easily transported, leaked, or lost while the Bring Your Own Device (BYOD) movement has dramatically increased the number of expensive security incidents.
Securing iOS and Android in the enterprise August 2013 Secure Work Space separates work and personal apps and data on iOS and Android devices without sacrificing the user experience.
The complex cloud security conundrum July 2013, Technews Publishing Hi-Tech Security Solutions delves into the complex and popular world of cloud computing with a view to understanding the security implications of this trend.
Emulating the enemy July 2013 Threat emulation is a critical technique in achieving more effective network security. Doros Hadjizenonos, sales manager at Check Point South Africa explains why.
Secure wireless LAN solution July 2013, Products & Solutions Fortinet has released its new secure wireless LAN solution specifically designed for distributed enterprises. The Fortinet Secure WLAN integrates wireless and wired access, security, authentication, switching ...
Hardened video encoder/decoder July 2013, Products & Solutions ComNet Europe is introducing a video encoder/decoder designed for those applications where temperature extremes, vibration, shock, voltage transients, and humidity with condensation are present. The new CNVETX1 video encoder/decoder is industrially hardened for use in the most extreme operating environments.
New model for consumer security 1 July 2013 McAfee launches unlimited cross-device security service with facial and voice recognition for consumer devices.