Firewalls are the cornerstone of security
Despite claims of its demise, the firewall is still the foundation stone of security deployments. Doros Hadjizenonos, Check Point South Africa sales manager, looks at how it has adapted to combat three decades of threats. Was your business online 20 years ago?...
SSL encrypted traffic management key
According to Blue Coat, NSS research has uncovered that 25% to 35% of network traffic is encrypted within most modern organisations and according to Gartner by 2017 over half of the network attacks targeting enterprises will use encrypted traffic to evade controls....
F5 Networks announces Silverline
F5 Networks has announced new hybrid service capabilities to help organisations scale IT resources across dynamic cloud and data centre deployments. Under the company’s new Silverline banner, F5 will offer extended security, optimisation and availability services from...
Dell improves security portfolio
Dell recently announced product integrations and innovations within its security portfolio that provide organisations with a high level of protection, and turn security into a business enabler.
Keyloggers steal millions of credentials
Malware and threats have evolved to previously unimagined levels. Gone are the days where pimply geeks in basements wrote proof-of-concept malware to show off – today’s threat authors mean business, whether that is stealing millions of rands, proprietary company data...
Longline phishing rears its ugly head
The past few years have seen a tremendous rise in the use of email as an attack vector for enterprises and larger entities. These attacks have also evolved in sophistication, from the first examples of malicious links or attachments being included in emails, to the...
New biometric solutions from OneVault
OneVault announced the launch of their hosted Proof-of-Life voice biometric solution which assists companies to confirm identity and life via a remote channel. ‘Proof-of-Life’ or ‘Certificate of Existence’ is a requirement of many organisations, specifically the likes...
Kaspersky Lab adds patents to IP portfolio
To effectively combat malicious software, Kaspersky Lab experts are constantly developing new tools that use advanced technology. Some of them are highly specialised, others are used in all products. One of the most interesting developments – the system and method for...
Security key as Africa moves to LTE
Securing the network is a top priority for telcos and carriers as LTE becomes increasingly mainstream across Africa, says Fortinet. Perry Hutton, regional director of Fortinet for Africa, says: “LTE is changing the playing field. The previous generation of mobile...
Integrated security a must
Businesses are under constant pressure to prevent security breaches by cunning and sophisticated adversaries that are targeting their most sensitive data. These attacks can have devastating consequences for organisations - putting their staff and customers at...
Botnets: robots to avoid
Malware has been around in some form for over 40 years, but the use of malware to take control of a group of computers that are then organised into something called a botnet is more than a 21st century phenomenon, says Carey van Vlaanderen, CEO of ESET Southern...
Fighting the outsider threat
It is common sense that the sooner an attack is identified, the faster it can be contained and mitigated, limiting the fallout as much as possible. Businesses need to supplement their traditional security tools and protocols with skilled incident response teams,...