Facebook Messenger privacy issues
Users of the iPhone and Android versions of Facebook’s app will have found that, when trying to get into messenger, they are directed to download a second app, Messenger that will allow you person-to-person messages. This has left many users in a bind, as without...
Making the most of a CCTV solution
CCTV surveillance is becoming an increasingly popular addition to the security portfolios of both business and home users. The presence of CCTV not only acts as a deterrent for many would-be intruders, it also gives users themselves additional peace of mind that their...
Kaseya acquires Scorpion Software
Kaseya, the leading provider of cloud-based IT management software, today announced the acquisition of Scorpion Software, a leading security and authentication provider offering integrated two factor authentication, single sign on and password management solutions....
Combat crime with new wireless alarm
Crime is on the increase and millions of South Africans cannot afford fully-fledged security and alarm systems, backed-up by armed response. Wireless communications specialist TruTeq Devices has launched the most affordable plug 'n play wireless security solution...
Security in a mobile environment
Mobility is essential in the business world, as being able to communicate while on the move is no longer a "nice to have", but a necessity, says Fred Mitchell, Symantec division manager, Drive Control Corporation. A variety of devices, including laptops, smartphones...
Security to mitigate social media attacks
Enterprises around the world are rapidly seeing the business benefits of social media. In fact, social media is becoming indispensable for business, says Anton Jacobsz, MD of Fortinet distributor, Networks Unlimited. It allows businesses to reach new and existing...
BlackBerry platform wins STIG approval
BlackBerry has announced that Secure Work Space for iOS and Android, a multi-platform containerisation solution managed through BlackBerry Enterprise Service 10 (BES10), has received Security Technical Implementation Guide (STIG) approval from the Defense Information...
IronTree offers Panda Cloud Fusion
IronTree has extended their range of cloud services to include Panda Cloud Fusion, delivering comprehensive security, management and support into one easy to use solution. This extends IronTree’s proposition adding protection and management to their already strong...
Cyberoam expands Central Console appliances
Cyberoam, a leading global provider of network security solutions, announced the Next-Generation Management series (CCC NM) of its Cyberoam Central Console appliances for Enterprises and MSSPs. Combining new powerful hardware and software architecture, the CCC NM...
Fortinet delivers 1Tbps firewall throughput
Fortinet has redefined the standard for firewall performance by being the first network security vendor to deliver a firewall that exceeds 1Tbps throughput. The new FortiGate 5144C performance and offers 10GbE, 40GbE and 100GbE connectivity options. This firmly...
The new face of information security
Once touted as a silver bullet, antivirus is now considered an ineffective security solution on its own. While AV is effective when detecting or blocking known pieces of malicious code, it is thought to fall short when it comes to defending against zero day attacks or...
Three-level approach to fraud prevention
Ever wondered why we can’t get a handle on fraud and why it keeps occurring? Actually it’s simple to understand but it is one of the largest issues many companies have to deal with, says Colin Hill, senior systems engineer: Risk Management Solutions, SAS.Consider this...