Common myths, misconceptions and paranoia about information security November 2008 As organisations embark on an information security management programme, they encounter a threat landscape that contains both real and perceived obstacles that distract them from business priorities, ...
How much is your laptop really worth? October 2008 When you lose a laptop due to theft or for any other reason, the hardware is the least of your worries, the real worry is what happens to the data on the device
Flexible and reliable wireless technology October 2008 Wireless security systems are designed to provide convenience, flexibility, reliability and also to reduce cost significantly. These wireless systems have taken the security industry by storm, as they ...
Protecting information is not optional September 2008 Horror stories of companies carelessly losing thousands or even millions of records containing customers’ credit card information will soon be a thing of the past. A new compliance standard, designed ...
Protect mobile information September 2008 In today’s technology-driven world it is amazing how many people do not take the steps to protect their information. Especially, when the information is mobile.
It is evident that people finally understand ...
Managing the process to reap IP rewards May 2008, Reditron The focus should be on continuous development of applications that are fast and effective within a clear business framework.
Bridging the gap March 2008, G2 Fire Lenel Systems International and Bioscrypt have been tightly integrating their products to provide organisations with a converged security solution that unifies physical and logical security, giving companies the ability to create a single unified identity platform.
FxSecure Key March 2008 FxSecure Key from RCG Systems SA is an anti-theft wireless card that provides fast Internet connectivity of up to 7,2 Mbps and also safeguards notebooks and data.
It protects confidential data in the ...
One security policy to rule them all: securing the remote workforce February 2008 Lifestyles and values have changed – and so has the workplace. A remote workforce has become a vital part of most organisations' operations.
The benefits? Workers are more productive, the company does ...
The new challenge of M2M December 2007 There are several trends shaping the future of machine-to-machine (M2M) technology, including the move toward true autonomous control of networked equipment and a greater level of intelligence built into the machine infrastructure
Composite approach critical to effective security December 2007 Organisations struggle to find the resources to maintain a balance between security and operations.
But automated, integrated security management enables organisations to set up an immediate framework ...
IT governance success strategies December 2007 Defined and measurable objectives, aligned with the broader business, supported by top management.
The concept of IT Governance is a hotly debated issue with company executives currently demonstrating ...
Evolution of anti-virus is forcing security beyond the gateway November 2007 Anti-virus is no longer simply anti-virus. This hugely influential market has changed significantly, driven by efforts of IT security solution providers to measure up to sophistication in digital threats ...
Spyware and viruses - two separate problems requiring separate defences August 2007 To the untrained eye, spyware and computer viruses may appear to be one and the same but in actual fact there are vast differences between the two.
Companies need to understand what the differences are ...
FxSecure Key August 2007 RCG Systems SA has launched its latest data security product, FxSecure Key, aimed at the consumer market. Using a wireless connection, it allows notebook users to retain the ability, when not in possession ...
Single sign-on July 2007, G2 Fire As computers are getting increasingly mobile and better connected, threats to data security are increasing in number as well as complexity.
Business customers, for whom data security can have a direct ...
Logical security June 2007 Information technology is undoubtedly playing an increasingly important role at educational facilities, and with this comes the ever-present threat of online security issues. Security threats facing ...
DSC T-Link TL250 June 2007, Elvey Security Technologies The TL250 uses the latest digital networking technologies to provide secure Internet communications over a private network (LAN/WAN) or the Internet between the control panel and the Sur-Gard System III ...
New Epson A3 photo printer April 2007, PCs & Workstations Epson has unveiled three new lightweight 3LCD projectors with market leading technology for the business and education markets.
The EMP-1715 is the smallest and lightest, high-brightness wireless projector ...