Information Security



Emulating the enemy
July 2013
Threat emulation is a critical ­technique in achieving more effective network security. Doros Hadjizenonos, sales manager at Check Point South Africa explains why.

Read more...
Secure wireless LAN solution
July 2013, Products & Solutions
Fortinet has released its new secure wireless LAN solution specifically designed for distributed enterprises. The Fortinet Secure WLAN integrates wireless and wired access, security, authentication, switching ...

Read more...
Hardened video encoder/decoder
July 2013, Products & Solutions
ComNet Europe is introducing a video encoder/decoder designed for those applications where temperature extremes, vibration, shock, voltage transients, and humidity with condensation are present. The new CNVETX1 video encoder/decoder is industrially hardened for use in the most extreme operating environments.

Read more...
Of security and open source software
July 2013
When it comes to open source software … are you more or less secure?

Read more...
New model for consumer security
1 July 2013
McAfee launches unlimited cross-device security service with facial and voice recognition for consumer devices.

Read more...
Financial institutions gamble with information security
1 July 2013, Financial (Industry)
Lack of security specialists lead to high risk, quick fix security solutions.

Read more...
Mining the cloud for security
1 July 2013
Cloud-based solutions embracing endpoint protection, e-mail security and systems management.

Read more...
Security for small businesses
1 July 2013
New 600 appliances provide security solutions to protect small businesses against the latest cyber attacks.

Read more...
New information protection solution
1 July 2013
Xerox and McAfee team up to deliver a new level of data protection.

Read more...
Verifying identity is essential
1 July 2013
“Being able to verify identity is essential to ensure that you are transacting with and communicating to a legitimately recognised and intended recipient,” says LAWtrust certificate service manager Megan Rehbock.

Read more...
New protection from ESET
June 2013
ESET releases ESET NOD32 Antivirus 6 and ESET Smart Security 6 with Anti-Theft, a dedicated Anti-Phishing Module and ESET Social Media Scanner.

Read more...
MWEB Business extends security offering
June 2013
MWEB Business has extended its portfolio of security offerings with the introduction of Percol8.

Read more...
Authentication critical in cyber ­security
1 May 2013
The unfortunate reality is that while business leaders know they are at war, they are prepared to tackle a highly skilled and motivated enemy with inferior weapons and tactics.

Read more...
Transnet focuses on data security
1 May 2013
In a digitally driven world, TNPA’s data is critical to performing its mandated functions and effective backup and restore capabilities are an integral part of protecting this data. In an effort to automate and streamline this process, TNPA turned to Altonet and the HP Autonomy Connected Backup solution to reduce risk, improve efficiency and ensure mission critical data is secure and protected at all times.

Read more...
The key to fraud prevention
1 May 2013
One of the greatest challenges facing organisations is the time-consuming nature of detecting and investigating fraud, which further impacts the financial and productivity losses caused by the fraud itself.

Read more...
The future is a secure cloud
1 May 2013
Cloud computing is predicted to be the future of the technology world and analyst reports abound on the expected growth of the uptake of these solutions. However, security issues remain one of the dominant barriers with the adoption of cloud solutions.

Read more...
Secure authentication for company networks
1 May 2013
ESETlaunches ESET Secure Authentication in South Africa: new two-factor one-time password authentication system for company networks.

Read more...
Preparation, expectation and ­authentication is key
April 2013, Technews Publishing
How exposed are South African companies to cyber attacks? Are they an easy target or simply ignorant? Are they doing enough to protect themselves? How serious is this threat to your average company in South Africa and Africa, or is the threat confined to certain types of companies?

Read more...
A conversation about security
April 2013, Technews Publishing
The person who is probably most in touch with the state of information security in South Africa is Craig Rosewarne, MD of Wolfpack Information Risk and founder and chairperson of the Information Security ...

Read more...
New approach to security
April 2013
RSA, the security division of EMC, announced the release of RSA Security Analytics, a transformational security monitoring and investigative solution designed to help organisations defend their digital ...

Read more...



<< First   < Previous   Page 56 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.