Information Security



HP strengthens security capabilities
March 2010
New security services and solutions from HP address security from the printer to the cloud. HP has introduced a security services portfolio and new solutions that offer increased vulnerability assessment, ...

Read more...
Terabyte network overview
March 2010
Cyberoam delivers a comprehensive view of all network devices, data redundancy. Cyberoam iView, the open source logging and reporting solution is now available in appliance form, delivering a cost-effective ...

Read more...
BitDefender's top e-threats
26 February 2010
People’s constant need to interact makes them targets for all sorts of malicious software

Read more...
Comodo Dragon protects online privacy
26 February 2010
With Comodo Dragon, information about online exploration stays as much as possible within the user's PC

Read more...
Giesecke & Devrient and ARM protect mobile applications from data theft
26 February 2010
Through the combination of ARM TrustZone technology sensitive applications such as electronic payment and online banking via mobile phone will be efficiently protected from security threats

Read more...
Network threats are evolving
February 2010
To protect against the increasing sophistication of network security threats, enterprises must work diligently to adopt a comprehensive security solution. Enterprise LAN and security professionals face ...

Read more...
Just for the hack of it
February 2010
Biodata IT says the local market must become more aware of the need to button up the network hatches. South Africa is not much different from the international market when it comes to the effects of ...

Read more...
E-threats are shifting
February 2010
Cybercriminals continue to find creative means of distribution. Malware writers have preserved their focus on Web-based attacks while actively looking for new methods to disseminate their products, ...

Read more...
Wireless future
January 2010, Technews Publishing (SA Instrumentation & Control), Integrated Solutions
While many in the security industry think the move to IP (Internet Protocol) is the only technical change they will have to deal with, the emergence of wireless technologies is making inroads into almost ...

Read more...
End point data protection
January 2010
Cyberoam, a vendor of identity-based unified threat management solutions, has announced the launch of its End Point Data Protection suite to secure corporate data and manage IT assets. This suite extends ...

Read more...
Cloud-based security services
January 2010
Panda Security has unveiled the next generation of its cloud-based anti-malware services for home users and SMBs: Panda Cloud Antivirus and Panda Cloud Protection. Panda Cloud Antivirus 1.0 is the industry’s ...

Read more...
Autorun-based malware tops BitDefender’s November Top Ten Threat Report
November 2009
Trojan.AutorunInf.Gen moves out of second place to take the lead. BitDefender’s Top Ten Threat Report for November is topped by Trojan.AutorunInf.Gen. Trojan.AutorunInf.Gen, which came in second place ...

Read more...
BitDefender Security for Mail Servers 3.0.2 achieves Virus Bulletin Gold Award for three tests
November 2009
BitDefender linux version provides low false positives, high spam catch rate. BitDefender, an award-winning provider of innovative anti-malware security solutions, today announced that BitDefender Security ...

Read more...
Crimes of our times
October 2009
Recently the seventh annual e-crime survey has been published, this article will highlight several of the findings of the survey and also discuss a new modus operandi of these types of criminals.

Read more...
IronKey Enterprise Server enables remote administration
October 2009
IronKey Enterprise Server v2.0 features automatic encryption, active malware defenses and identity services with remote management capabilities

Read more...
Fortinet addresses major security threats with comprehensive solution set
October 2009
Fortinet offers a comprehensive security solution that encompasses e-mail, gateway, database, Web applications and end-points

Read more...
Internet Solutions first to deploy FireID to corporate base
October 2009
Internet Solutions has now integrated FireID into its VPN security layer, SecureConnect, and is offering all customers a choice of FireID or a hardware token for authentication

Read more...
BitDefender Security for File Servers receives VB100% certification from Virus Bulletin
October 2009
Excellent scores achieved in October’s 2009 Microsoft Server 2008 test. BitDefender announced that BitDefender Security for File Servers was awarded VB100% certification from Virus Bulletin for its ability ...

Read more...
Trojans continue to dominate BitDefender’s top 10 e-threats for October
October 2009
Trojan.Clicker.CM continues its hold as the number one e-threat The top spot on BitDefender’s top ten list of e-threats for October is once again Trojan.Clicker.CM, which is mostly present on websites ...

Read more...
BitDefender offers Twitter spam protection tips
September 2009
What is the Twitter spam invasion? And how can you prevent it? With the popularity of social networking platforms such as Twitter on the rise, cyber criminals have found an easy target among unsuspecting ...

Read more...



<< First   < Previous   Page 68 of 85   Next >   Last >>