Kaspersky Endpoint Security for business available
Kaspersky Lab has announced the availability of Kaspersky Endpoint Security for Business AWS Edition. The special edition of Kaspersky Lab's corporate security solution allows Amazon WorkSpaces customers to easily purchase an additional layer of protection for their...
Why parents must teach their children about Internet security
Parenting, as we know it, is evolving in this modern, digital age. Mothers and fathers have traditionally warned their children of the physical dangers, be they pickpockets on the street or strangers in the park. Today, however parents are facing an altogether...
Check Point joins AirWatch alliance
Check Point Software Technologies has joined the AirWatch Mobile Security Alliance as a founding member. Together, Check Point and AirWatch will drive new ways for customers to protect the growing number of devices accessing corporate data and networks, and delivers a...
Protecting against today’s advanced threats
Although companies are investing millions in cyber security solutions, stories of advanced cyber-attacks continue to flood the headlines on a daily basis. The attackers are succeeding, and are wreaking significant financial, operational and reputational damage to...
New firewalls from Fortinet
Fortinet has launched its new FortiWeb 4000E and 3000E Web Application Firewalls (WAFs), designed to help customers prevent identity theft, financial fraud and denial of service through specialised, layered application threat protection. ortiWeb appliances now offer...
Reducing the cyber-attack surface
Most breaches and attacks do not happen quickly and violently. They happen stealthily over time, with threat actors lurking inside your network for months at a time, performing reconnaissance and looking for your most valuable and sensitive information. “In fact, the...
Why standard data centre designs don’t work
Fast deployment time compared to traditional brick and mortar facilities is one of the biggest advantages of prefabricated data centres. Time can be saved in many areas of a project. However, when it comes to the actual initial design phase of a data centre, it simply...
Xerox combats counterfeiting with printed memory
To help businesses and government better secure products as they are distributed, Xerox has introduced two printed electronic labels (also known as “printed memory”) that can collect and store information about the authenticity and condition of products. Xerox Printed...
A click away from sharing company info on Facebook
With the proliferation of mobile devices in the workplace, it has become critical to not only manage your mobile assets, but also protect your company’s data. The purpose of enabling a mobile workforce is to increase employee productivity and improve customer service,...
CA leads in API management, says KuppingerCole
CA Technologies has been named the “overall leader” in API management in the recent Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA’s API Management solutions were evaluated for the report, which...
Sophos recognised in three Magic Quadrant reports
Sophos has once again been positioned in the “Leaders” quadrant of Gartner’s 27 August “Magic Quadrant for Unified Threat Management.” The quadrant is based on an assessment on a company’s ability to execute and completeness of vision.
Changing the security culture
Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...