Sophos blow to cyber-threats with Sandstorm
Sophos has announced that its Sophos Email Appliance now includes Sandstorm, an advanced, next-generation sandboxing technology that quickly and accurately detects, blocks and responds to sophisticated, constantly-changing cyber threats. Sophos Sandstorm is an...
Check Point simplifies security with R80
Addressing the sprawling complexity of securing today's modern enterprise, Check Point Software Technologies recently introduced its next-generation security management platform, Check Point R80. The new platform represents over three years of R&D, building on...
Kaspersky Lab protection goes wearable
Kaspersky Lab unveils a new version of Kaspersky Internet Security for Android that, in addition to offering improved performance speed and protection quality, includes an option for managing protection via Android Wear devices. In 2015 alone, Kaspersky Lab registered...
New security platform from Arbor Networks
Arbor Networks has introduced a new security platform for advanced threat protection. Arbor Network Spectrum is designed specifically for security teams, from the most senior responder to novice analysts, to search the entire network to uncover, investigate and prove...
Threats to pay attention to …
Eset's laboratories constantly analyse and study how cybercriminals propagate their threats all over the world. Looking back at ESET's trend papers, the company sees the evolution and the changes that companies have had to undergo. From a corporate standpoint,...
ID assurance, governance with RSA Via
curity Division of EMC, has announced new innovative identity assurance and identity governance capabilities in RSA Via. These new capabilities are designed to help organizations effectively balance security and user convenience as they assure identities and better...
RSA adds realtime behaviour analytics
RSA, The Security Division of EMC, has announced that RSA Security Analytics now offers a real-time behaviour analytics engine that is designed to expedite detection of advanced attack activities. Using machine learning techniques, the engine is built to able to...
Integrated security key for sophisticated attacks
South African companies need to automate and integrate their IT security solutions to meet increasingly sophisticated threats, writes Intel Security's Trevor Coetzee. The trends and threats encountered by South African companies are largely those of our global...
Trend Micro Cloud App Security is more sharing
Business cloud users are estimated to grow from 50-million in 2013 to 695-million by 2022, making data security a top operational concern for organisations transitioning to the cloud. Trend Micro has announced the expansion of its Cloud App Security solution to Box,...
Kaspersky Lab launches security intelligence services
Kaspersky Lab has expanded its enterprise portfolio with the launch of Security Intelligence Services - a diverse set of services aimed at faster sharing of leading security expertise and transforming knowledge into protection for its clients. Aimed primarily at...
Kaspersky Lab secure testing top spot
Kaspersky Lab has claimed top spot in the TOP3 metric for Internet security for the third year in a row, proving that its products offer the best protection from cyberthreats in the industry. Kaspersky Lab products scored more top-three places than any other vendor in...
IT among the top operational risks in 2016
Information technology accounts for two of the Top 10 Operational Risks for 2016 identified by risk.net while interviewing chief risk officers, heads of operational risk and other operation risk practitioners at financial services firms, banks, insurers and asset...