Sophos boosts enterprise mobility management
Sophos has announced the availability of Sophos Mobile Control 6.0, which now includes Sophos Secure Email, a container solution that isolates and secures business data from personal information on devices. Sophos Mobile Control 6.0 also enhances data protection...
Endpoint is a security blind spot
With all the attention on protecting company networks and data against threats from the net, the endpoint is becoming the new security blind spot. Companies need to pay closer attention to the security status of the endpoints in their ecosystem and watch what their...
Malware as a service hits 400 000
Kaspersky Lab's Global Research and Analysis Team has published extensive research on the Adwind Remote Access Tool (RAT), a cross-platform, multifunctional malware program also known as AlienSpy, Frutas, Unrecom, Sockrat, JSocket and jRat, and which is distributed...
Arbor tops IHS Infonetics report on DDoS prevention appliances
Arbor Networks has been identified again as the top supplier of distributed denial-of-service (DDoS) mitigation appliances overall, as well as in the Carrier, Enterprise and Mobile market segments, according to a new report from Infonetics Research. According to...
Keeping children productive and safe on the Net
In the cloud-first, mobile-first era, students, parents, and teachers are empowered to accomplish more by tapping into the power of the Internet, social networks, data analytics and mobile devices, writes Anthony Doherty, Windows business group lead. However, online...
A simple firewall appliance for the small office and home office
Tarsus Distribution has introduced the Dell SonicWALL SOHO Unified Threat Management (UTM) firewalls to South Africa, providing resellers with a simple to deploy and easy to manage firewall appliance for the small office and home (SoHo) market. The new product offers...
Check Point super-sizes appliance for SMEs
Check Point Software Technologies has unveiled the Check Point 700 Series appliances, designed to enable small and medium-sized businesses to innovate and grow without the worry of today's most sophisticated cyber criminals and zero-day threats. The new purpose-built...
Protect your business from cybercrime
Obtaining sensitive data is the primary objective for cybercriminals when targeting businesses. Sensitive data can vary depending on the organisation but examples include intellectual property, source code, trade secrets, customer and employee personal identifiable...
Will the Fourth Industrial Revolution be safe?
The convergence of the digital and physical worlds is more than a MasterCard rally cry, writes Ajay Bhalla, president: enterprise security solutions at MasterCard. It is in fact a fundamental shift that's driving the Fourth Industrial Revolution or Industry 4.0, where...
Easy-to-use enterprise mobility management from Sophos
Sophos has announced the availability of Sophos Mobile Control 6.0, which now includes Sophos Secure Email, a container solution that isolates and secures business data from personal information on devices. Sophos Mobile Control 6.0 also enhances data protection...
Cloud-based security best for multiple remote threats
Cloud-based security solutions are the more effective and most immediate way for companies to deal with security threats arising from the multiple internet access points created by employees on their devices from remote places. This is according to Richard Broeke, an...
Security, security, security
Jason Dover, director: product line management at KEMP Technologies explores the security imperative for today's complex networks. It is every CISO's worst nightmare - the phone call in the middle of the night to say that a security breach has occurred. For the rest...