Information Security



The seven deadly sins of real-world backups
June 2005
Businesses can contract a third-party backup storage specialisation company that offers best practice-based services that apply internationally recognised and accepted processes

Read more...
Confessions of a CTO
June 2005
The bottom line is that many organisations today are frighteningly exposed when it comes to the security of sensitive information within their organisations, and they simply have no idea how to solve the problem

Read more...
Affordable frequency
June 2005, News & Events
If you are currently paying a monthly rental for each transmitter on your alarm network, you are probably being ripped off! Affordable frequency usage is however available right now, thanks to RDC. RDC ...

Read more...
Local, integrated access control
June 2005, Access Control & Identity Management
Building upon a wealth of experience gained through the development of System 42 and associated hardware (Syclon), Entex introduces a locally developed product capable of delivering the latest access ...

Read more...
Security and safety enhanced by a lock
June 2005, Products & Solutions
The UniLock system strikes a balance between traditional physical security and advanced electronic technology that allows for full audit trails and selected access times to be programmed. Locally developed ...

Read more...
Hardware compression vs software compression
June 2005
Since the beginning of digital CCTV there has been a division between the embedded and the PC-based systems. Both parties have valid arguments as to what qualities make theirs best. One of the key differences ...

Read more...
Realtime prevention and detection of fraud a governance reality
June 2005
Every day across South Africa employees are busy stealing confidential company data and, bosses, in many cases, are not even aware the theft has taken place. Business and data security has become a critical ...

Read more...
Penetration testing - protection against risk
May 2005
Penetration testing has been a mainstay of IT security for several years and many people think they know what it involves. However, many people actually have a very loose understanding of what it needs ...

Read more...
Web security - a recipe for protection for Web services and applications
May 2005
Although most companies have some level of IT security in place, it is all too frequently the case that they are failing to address one of the fastest growing areas of vulnerability: security of their ...

Read more...
Identity theft in the corporate network
May 2005
The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, ...

Read more...
Intrusion protection: why it is needed, what is involved, what are the pitfalls and challenges?
May 2005
Intrusion protection takes the argument for intrusion detection one stage further, by not just discovering attacks on a network, but blocking and preventing them from happening again. With companies ...

Read more...
ISA 2004 protected by BitDefender
May 2005
BitDefender has announced the launch of BitDefender v2 for MS ISA Servers, a full-featured antivirus for Microsoft ISA 2000 and 2004 Servers. The newly launched product is aimed at SMBs and large corporate ...

Read more...
Pinpoint and eradicate digital threats
May 2005
Synaq, a Managed Linux Services company, is pleased to announce the availability of its managed e-mail security solution, Pinpoint Securemail, to the local market. This flexible solution, built on Open ...

Read more...
Endpoint security end game
April 2005
We have come up with 'seven signs' that can help any enterprise evaluate just how secure it is at the endpoint

Read more...
Benefits of tying into PV&P Africa
April 2005, News, Security Services & Risk Management
The fourth international exhibition of Pumps, Valves and Pipes Africa sees an exponential boom as three major water industry events join forces at Gallagher Estate in Johannesburg in June 2005.       Water ...

Read more...
Freedom from security
April 2005
Ian Schenkel, MD of Sygate EMEA, illustrates the security headaches that organisations face in the battle to enable mobile working, and puts forward a remedy that will ensure the integrity of corporate ...

Read more...
Johnson Controls launches new Cardkey P2000
April 2005, Johnson Controls
Johnson Controls has launched the latest version of the Cardkey P2000 security management systems, featuring a number of enhancements. In addition to a new remote redundancy option for increased system ...

Read more...
Companion chip simplifies integration of common interfaces
9 March 2005, Telecoms, Datacoms, Wireless, IoT, Integrated Solutions
A multifunction IC from Toshiba allows engineers to quickly and cost-effectively add a number of common interfaces to multimedia, networking, and other embedded applications. This single IC with PCI, ...

Read more...
New tiny AVR microcontroller members
9 March 2005, Altron Arrow, EBV Electrolink, DSP, Micros & Memory
Three new members have been added to the tinyAVR 8-pin family of Flash microcontrollers from Atmel. The devices offer three different Flash, EEPROM and SRAM combinations. The ATtiny25 has 2 KB of self-programmable ...

Read more...
ADSL: an appropriate solution
March 2005, Communications, Messaging, Security Services & Risk Management
While the hype surrounding the widespread availability of asynchronous digital subscriber line (ADSL) in South Africa in late 2002 soon dissipated into disappointed gripes about its poor performance, ...

Read more...



<< First   < Previous   Page 75 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.