Are biometrics solutions really secure?

Biometric access control technology has experienced phenomenal growth in adoption in South Africa over the past few years, with an estimated 80% of all access control solutions using fingerprint readers and other biometrics to enhance security, says Kobus Le Roux,...

Cloud security key for company data

There’s been a proliferation of cloud service providers on the local scene and this has granted companies the privilege of greater choice around who to entrust their data. The right to choose is one that Richard Broeke from specialist managed IT security services...

Panda delivers security for mining industry

Minopex, a leading exponent in outsourced operation and maintenance of minerals and metals processing plants, recently installed Panda Cloud Systems Management (PCSM) as its IT management solution of choice. Prior to the adoption of PCSM, the company’s IT management...

How to choose a remote monitoring service

When Dr Rudolph Zinn of the School of Criminal Justice recently did intensive research on the nature of robberies and attacks, he revealed some interesting findings: one being that alarms and armed reaction services are not a deterrent for robbers any longer, says...

How to choose a remote monitoring service

When Dr Rudolph Zinn of the School of Criminal Justice recently did intensive research on the nature of robberies and attacks, he revealed some interesting findings: one being that alarms and armed reaction services are not a deterrent for robbers any longer, says...

Managing mobile security in South Africa

From smartphones to tablets, mobile devices continue to cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported, leaked, or lost while the BYOD movement has dramatically increased the number of...