What you need to know about cyber-security innovation
As cyber attackers increase their ability to innovate, so they are able to enhance their capacity to outpace state-of-the-art security technology, writes Paolo Campoli, head of global service provider sales: Middle East & Africa at Cisco. Keeping up with the...
Security: the platform for IoT success
Widely regarded as the hottest topic in high-tech, the IoT (Internet of Things) is attracting the attention of countless enterprises across a wide array of industries, writes Sherry Zameer, senior vice-president: telecommunication solutions for the Middle East &...
How the cloud can improve security
As we trust more and more of our critical applications, services and systems to the cloud, there is no reason why security should not be on that list, says Gary Newe, technical director at F5 Networks. The advantage of being in this industry for a while is that you...
GIT’s DVTEL suite offers 4K visuals, thermal cameras
Perimeter security is a fundamental component of security systems - a first line of defence against external physical threats. Advanced video surveillance systems, like the DVTEL suite from Graphic Image Technologies (GIT), provide an advantage, incorporating thermal...
Protect yourself from a surge in cybercrime
Online fraud is on the increase in South Africa, with criminals seeing individuals' online banking accounts as particularly rich pickings. By Zane Renou, chief commercial officer at Cellfind Cybercrime, of which online banking scams account for significant portion, is...
Destroy data with MAXXeGUARD
Local IT asset sisposal specialist Xperien has launched MAXXeGUARD, a mobile, low-noise shredder that can be used in every office environment to destroy a wide range of digital media quickly and securely. Xperien CEO Wale Arewa says data theft from digital media is...
Check Point makes the Magic Quadrant again
Check Point Software Technologies has been positioned as a Leader in the 2015 Gartner Magic Quadrant for Mobile Data Protection. Celebrating its ninth consecutive year in the Leaders quadrant, Check Point continues to secure the mobile space and recently announced...
How to manage the human firewall
Security has become a top priority for businesses in an effort to protect themselves from an ever-increasing variety of threats that continue to advance in sophistication and persistence, writes Simeon Tassev, director of Galix. Many organisations have implemented...
Integrated video for better security
The University of the Western Cape (UWC) appointed EES Africa to design and manage the installation of new Video Management Software (VMS) for the campus. The client wanted the VMS to fully integrate with their current access control, fire detection and intrusion...
How to achieve data-first security strategy
Old-fashioned attempts to protect data by building impenetrable firewalls are impractical in the age of big data. It's just too expensive and, anyway, business success increasingly means opening up to customers and business partners. By Godfrey Kutumela, head:...
Ultra HD cameras take video surveillance to the next level
Video surveillance is an increasingly important part of any comprehensive security system. However, in large spaces or areas where a high level of detail is required there are a number of challenges, writes Laurence Smith, executive at Graphic Image Technologies....
The latest on cybercrime and cybersecurity in SA
In today's fast-moving world, technological advances happen faster than legislation can keep up, and will continue to do so for many years to come, writes Christoff Smith, senior software engineer at Entelect Software. As software engineers, the onus lies on us, not...