Intelligent video can mitigate crime
While South Africa’s high crime rate has been a point of concern for two decades, law enforcement has only recently started looking at implementing technology solutions that provide for pre-emptive engagement through actionable intelligence.Today, strategic sensors...
Sophos adds iOS 8, Windows Phone 8.1 support
Sophos has announced the availability of Sophos Mobile Control 5 (SMC 5), to further simplify mobile device management by setting security and data policy by user, across all three major mobile platforms in one solution. New management options enable an administrator...
Fighting the insider threat
In the past, security efforts were largely focused on preventing cyber criminals from gaining access to the company network, says Anton Vukic, channel director, Phoenix Distribution. Today, although this threat continues to be a real danger, there has been a growing...
CCTV with remote monitoring boosts security
Public transport is a vital service in any country, as ensuring people can move around freely to and from work and school is essential in creating economic sustainability, says Laurence Smith, executive at Graphic Image Technologies. However, the best public transport...
Fortinet expands ATP framework
Fortinet is protecting customers at every entry point into the network with its expanded advanced threat protection (ATP) framework, which extends from endpoint devices all the way to the data centre. The company has announced enhancements to its FortiClient solution,...
BT launches Assure Cyber
BT has announced the launch of BT Assure Cyber, an advanced security platform designed to offer complete and comprehensive monitoring, detection and protection against cyber threats targeted at private sector and government organisations. The new solution builds on...
CCTV with remote monitoring is key
Video surveillance and CCTV solutions have become essential components of business security, providing visual evidence of misdeeds and their perpetrators, which acts as an effective deterrent for most petty crimes, says Laurence Smith, executive at Graphic Image...
Preventing watering hole malware attacks
A layered approach based on a combination of checks and balances, along with various key technologies, is the most comprehensive method of preventing so-called watering hole malware attacks. South African ICT managed cyber security provider and specialist Ukuvuma...
New assessment offering from DiData
Dimension Data has announced a new assessment offering that helps organisations assess the maturity of their security architecture, the underlying security safeguards that protect their human assets from cyber-attacks, and their processes and technologies. Sean Duffy,...
Protective monitoring key for security
Continuous end-point visibility has a massive role to play in mature security programs, says John Mc Loughlin, MD of J2 Software. Our customers with mature security programs have invested heavily in perimeter security, logging, and enhanced server / endpoint controls,...
Check Point ranks tops in firewall equipment
Check Point Software recently announced the company leads the worldwide market share for Firewall Equipment in Q4 2014 and FY 2014, according to research published by Gartner. Gartner’s Market Share Enterprise Network Equipment research states: * Check Point leads...
Voice biometrics reduces fraud
As the business realm continues to digitise, fraud, ID theft and information security concerns grow, and strong authentication becomes a critical issue. Voice biometrics is being adopted globally by companies, especially those with large contact centre operations,...