Jasco boosts university’s security

The University of Pretoria has contracted the expertise of Jasco Security Solutions since 2004, to maintain and expand its fully-redundant Cosmos4 Alarm Systems at its campus grounds, which include its Main and Sports campus, Groenkloof, Onderstepoort, Mamelodi and...

Emulating the enemy

Threat emulation is a critical technique in achieving more effective network security. “Know your enemy as well as you know yourself” is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. ...

A little security for big data

Bringing the issue of security into the big data discussion often produces two divergent schools of thought from IT professionals − categorical denial that big data should be treated any differently from existing network infrastructure, and an opposite response...

Reasons to renew security software licenses

Security software is something every person with a computer and an Internet connection should have to protect personal information from a wide variety of cybercrime threats, says Fred Mitchell, Symantec business unit manager, Drive Control Corporation. However, having...

Why the cloud requires agentless security

Virtualised desktops, servers, data centres and cloud computing solutions should be afforded the same level of security as physical machines, is the word from global security specialists Trend Micro. According to Trend Micro country manager, Gregory Anderson, there...

The dangers of BYOD implementation

According to a Forrester survey carried out in Q4 of 2012 75% of company employees across the globe want to use their personal mobile devices for work on a daily basis. This is a 3% increase from the figures in 2011. Most (76%) of this group is specifically interested...