Check Point makes the Magic Quadrant again
Check Point Software Technologies has been positioned as a Leader in the 2015 Gartner Magic Quadrant for Mobile Data Protection. Celebrating its ninth consecutive year in the Leaders quadrant, Check Point continues to secure the mobile space and recently announced...
How to manage the human firewall
Security has become a top priority for businesses in an effort to protect themselves from an ever-increasing variety of threats that continue to advance in sophistication and persistence, writes Simeon Tassev, director of Galix. Many organisations have implemented...
Integrated video for better security
The University of the Western Cape (UWC) appointed EES Africa to design and manage the installation of new Video Management Software (VMS) for the campus. The client wanted the VMS to fully integrate with their current access control, fire detection and intrusion...
How to achieve data-first security strategy
Old-fashioned attempts to protect data by building impenetrable firewalls are impractical in the age of big data. It's just too expensive and, anyway, business success increasingly means opening up to customers and business partners. By Godfrey Kutumela, head:...
Ultra HD cameras take video surveillance to the next level
Video surveillance is an increasingly important part of any comprehensive security system. However, in large spaces or areas where a high level of detail is required there are a number of challenges, writes Laurence Smith, executive at Graphic Image Technologies....
The latest on cybercrime and cybersecurity in SA
In today's fast-moving world, technological advances happen faster than legislation can keep up, and will continue to do so for many years to come, writes Christoff Smith, senior software engineer at Entelect Software. As software engineers, the onus lies on us, not...
Kaspersky patents virtual machine protection
Kaspersky Lab has patented a new technology designed to prioritise data-scanning tasks on virtual machines. The technology significantly speeds up processing of high-prioritise scan requests in real time, while maintaining virtual machine performance. The patent was...
Sophos adds auto scaling to UTM for AWS
Sophos has announced enhancements to its Unified Threat Management (UTM) solution designed for organisations of all sizes using Amazon Web Services (AWS). Sophos UTM 9 features Auto Scaling technology to ensure a user's security layer scales to match application needs...
Panda Security launches Adaptive Defense
With more than 230 000 new malware samples created daily, businesses are facing increased threats that put their confidential information at risk and leave them in compromising situations. Introducing Adaptive Defense 360, Panda's latest solution that covers all that...
Fortinet expands security architecture
Fortinet has announced details of its new Secure Access Architecture, expanding Fortinet's innovative Internal Segmentation cybersecurity strategy and enabling organisations to seamlessly segment devices and the access layers across wired and wireless networks. The...
Sophos hits Gartner Leaders Quadrant seven times
Sophos has has once again been positioned in the “Leaders” quadrant of Gartner’s 8 October 2015 “Magic Quadrant for Mobile Data Protection Solutions”.
Cyber security concerns in Back 2 the Future II
A remarkable amount of the 'futuristic' technology seen in the film has come true, even if it has yet to become mainstream, says Gary Newe, technical director at F5 Networks. Looking back at the tech predictions made in Back to the Future II, it's interesting to see...