Information Security



New backup option
1 June 2012
Symantec declares better backup for all sized organisations and calls for 80 percent reduction in operating costs. New survey data reveals that the current approach to backup modernisation is broken.

Read more...
E-mail plug-in boosts continuity
1 June 2012
Securicom has boosted its e-mail archiving and business continuity solution, MailVault, with a plug in that integrates with corporate e-mail clients and allows users to continue accessing and working with e-mails, using their usual e-mail interface, even when the server is down.

Read more...
Security begins with the basics
April 2012, Technews Publishing, Infrastructure
Whether your infrastructure is designed to support data, security or anything else, IP technology is under attack and you need to ensure it is protected to facilitate streamlined business and security operations.

Read more...
Data security is not optional
April 2012, Technews Publishing
Anyone who is not worried about the security of their data, be it personal information, contact databases or intellectual property, simply has not been paying attention.

Read more...
The RSA Security breach
April 2012
The sophisticated multi-pronged attack that struck RSA Security last March has resulted in the high profile IT security vendor overhauling the manufacturing and distribution of its SecurID tokens.

Read more...
Securing IT systems
April 2012, Fourier IT Innovation
Big access control vulnerabilities mean big opportunities in 2012.

Read more...
E-mail protection
April 2012
Loophold delivers Barracuda technology with reach inside the network perimeter for AV protection on MS Exchange: includes anti-virus agent that runs on Exchange servers and expanded encryption capabilities.

Read more...
More than backup
April 2012
Seamless and cost effective data protection solutions.

Read more...
Securing enterprise mobility
April 2012
Symantec advances enterprise mobility strategy, delivers innovations to improve data security and facilitate broader application adoption.

Read more...
Hosted backup gives small businesses peace of mind
6 March 2012
Small businesses often fail to keep adequate backups of their critical files and servers because it seems complicated and expensive. But losing data can be crippling for a business.

Read more...
USB encryption
6 March 2012
We are starting to see the arrival of GPS/GSM-enhanced USB sticks, which can be tracked as they move around in someone's briefcase, purse or pocket. These locate, but do not necessarily secure the data.

Read more...
780 new malicious programs detected every day
6 March 2012
780 signatures for new malicious programs that target sensitive financial information are added to Kaspersky Lab’s antivirus database on a daily basis.

Read more...
DAS, NAS, SAN, RAID - who cares?
March 2012, Infrastructure
Are surveillance storage acronyms driving you crazy?

Read more...
A 12-step programme
1 March 2012
Calum MacLeod describes the twelve steps to IT security Nirvana

Read more...
Virtual environments demand concrete security
1 March 2012
In order to keep corporate information safe in the virtual environment, organisations will need to take an integrated approach. Consider the following five steps to successfully implementing virtualisation in an organisation

Read more...
Small business, big risk
February 2012, Access Control & Identity Management
Small businesses are not directly attacked as often as larger organisations, but small and midsize businesses are still falling prey to cyber attacks

Read more...
McAfee Deep Defender arrives
1 March 2012
McAfee Deep Defender is capable of detecting nearly all kernel-mode malware because its protection layer is located beyond the operating system

Read more...
Virtually secure in the cloud
1 March 2012, Security Services & Risk Management
CA Southern Africa establishes an alliance with HyTrust to improve security and compliance for customers using virtualised systems and cloud infrastructures

Read more...
Android risks climbing
1 March 2012
Manufacturers of Android mobile phones continue to compromise users’ security says British IT security company on the eve of the Mobile World Congress in Barcelona

Read more...
Leading USB security
March 2012
Germany named European leader in USB drive data security.

Read more...



<< First   < Previous   Page 59 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.