IBM's integrated security framework August 2012, Technews Publishing To address the increasing need for an integrated security offering to deal with the growing security threats businesses face, IBM launched IBM Security Systems (ISS) late last year following its purchase of Q1 Labs.
Bringing mobility into business August 2012 The proliferation of Apple iOS and Android based mobile computing devices is significant, not only in the consumer space, but also in the office. People are quick to gravitate to the ease of use, increased mobility and portability with access to applications anywhere any time.
Beyond signatures and behavioural heuristics August 2012, Products & Solutions Over 95% of businesses unknowingly host compromised endpoints, despite their use of traditional and next-generation firewalls, intrusion prevention systems (IPS), antivirus and web gateways.
Security updates. Who cares? 1 August 2012 25% of adults don’t clearly understand what software updates do. The solution lies in developing security systems that are as transparent as possible to use, and ensuring those solutions are as easy to use as possible.
It is the data, not the device 1 August 2012 The IT manager has the opportunity to redefine his/her role as the custodian of corporate data, managing information not devices. It is this shift in focus to managing data rather than devices that turns a headache into an opportunity.
The genesis of privileged identity 1 August 2012 Whether someone starts with a server or a workstation, creates on-premise solutions for their network infrastructure or builds out a cloud, they’ll always have to start out with an account with God-like power that will control all other accounts accessing that resource going forward in the future.
The case for mobile device management July 2012 Companies need a solid mobile device management strategy if they are to effectively and safely unlock the opportunities of an increasingly mobile workforce.
Protect your data with IAM July 2012, Access Control & Identity Management Prevent fraud, comply with POPI and protect your data inside and out with identity and access management.
Security perception vs reality June 2012 ‘State of Security’ report shows organisations recognise a pervasiveness and resiliency of cyber criminals’ yet 79% experienced a significant incident in past 12 months.
Protect your Android June 2012 Kaspersky Lab’s new tablet security solution provides effective protection from malware, secures the user online experience and keeps your personal data safe, even if the device is lost or stolen.
It is what is inside 1 June 2012 An unsettling comment in the CSFI report states, “We have seen an alarming shift in the perpetrator profile towards senior management. This is also reflected in the types of economic crime that are being committed.”
How safe are your mobile banking apps? 1 June 2012 25% of the mobile banking apps tested didn’t provide adequate security: passwords, partial credit card details, payment history and transaction details were easily retrieved from the handset. What’s more, another 31% of banking apps had less severe security issues with 44% offering adequate security.
New backup option 1 June 2012 Symantec declares better backup for all sized organisations and calls for 80 percent reduction in operating costs. New survey data reveals that the current approach to backup modernisation is broken.
E-mail plug-in boosts continuity 1 June 2012 Securicom has boosted its e-mail archiving and business continuity solution, MailVault, with a plug in that integrates with corporate e-mail clients and allows users to continue accessing and working with e-mails, using their usual e-mail interface, even when the server is down.
Security begins with the basics April 2012, Technews Publishing, Infrastructure Whether your infrastructure is designed to support data, security or anything else, IP technology is under attack and you need to ensure it is protected to facilitate streamlined business and security operations.
Data security is not optional April 2012, Technews Publishing Anyone who is not worried about the security of their data, be it personal information, contact databases or intellectual property, simply has not been paying attention.
The RSA Security breach April 2012 The sophisticated multi-pronged attack that struck RSA Security last March has resulted in the high profile IT security vendor overhauling the manufacturing and distribution of its SecurID tokens.
E-mail protection April 2012 Loophold delivers Barracuda technology with reach inside the network perimeter for AV protection on MS Exchange: includes anti-virus agent that runs on Exchange servers and expanded encryption capabilities.