Cyberoam expands iView portfolio
Cyberoam has announced the availability of its next-generation reporting series of iView appliances – iView NR, for Enterprises and MSSPs. The iView appliances offer centralised logging and reporting of Cyberoam network security appliances, along with other UTMs and...
Gartner names Check Point as UTM leader
Check Point Software Technologies, a leader in securing the Internet, recently announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant for Unified Threat Management (UTM). This is the fourth consecutive year that Check Point has been named...
NetTraveler gets 10th anniversary makeover
In 2014 the actors behind global cyber-espionage campaign Operation NetTraveler celebrate 10 years of activity. Although the earliest samples appeared to have been compiled in 2005, certain indicators point to 2004 as the year when the malicious activity started. For...
An holistic approach to data protection
Complexity around data protection in the enterprise is increasing, especially with hybrid cloud implementation patterns. Kelly Brown, senior director: Regional and Channel Marketing for EMC Corporation’s Data Protection and Availability Division, says: “Successfully...
Sophos named a leader in UTM
Sophos has announced that it has once again been positioned in the Leaders quadrant of Gartner's 7 August, 2014 Magic Quadrant for Unified Threat Management. The quadrant is based on an assessment of a company’s ability to execute and completeness of vision. Sophos is...
Beware of the man in the middle
The motive for the vast majority of cybercrime is either to steal money or data. These attacks are sometimes small, targeting individuals, or sometimes massive, targeting large enterprises and stealing thousands of users’ details. In the majority of cases, attacks try...
Android app SandroRAT targets Polish banking
Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is via SMS (text) messages, as you can read in this recent McAfee Labs post, while in Poland there is an on-going e-mail spam campaign...
Vivotek offers weatherproof surveillance
South Africans are no strangers to harsh weather conditions, with rough winds, hail downpours and thunderstorms that stun. With the new next-generation 1080p full HD speed dome network camera SD8364E from Vivotek, worries about the survival of your surveillance...
IoT is already here
With 2014 being dubbed as the year of the Internet of Things (IoT), there are major concerns regarding the security and privacy issues that consumers face now, and potential problems they could have in the future, says Trevor Coetzee, regional director South Africa...
Fighting the new style of cybercrime
The nature of the cybercrime landscape is shifting. No longer are the main threats related to the theft of personal details and financial information – like capturing logon credentials, identity theft and stealing credit card data. Today’s most destructive breaches...
Malware hides in Android apps
A common piece of advice for Android users is to refrain from downloading applications from unknown sources. Although malware does show up at the Google Play store from time to time, it is much better controlled, than on other app stores, says Carey van Vlaanderen,...
Netshield unveils data centre in a box
Netshield has unveiled its Data Centre in a Box offering, a self-contained IP 54 rated mobile unit that enables a business to rapidly and immediately wheel in, plug in and go, an entire IT infrastructure that can be managed from a single IP address in minutes. The...