Kaspersky scores in comparative testing
Kaspersky Lab has announced the results of a comparative test intended to measure the overall efficiency of its new Kaspersky Security for Virtualization | Light Agent software in comparison with Symantec Endpoint Security and Trend Micro Deep Security running on a...
Symantec release tackles data growth
Symantec has released Backup Exec 2014, a unified solution that protects organisations’ critical data by delivering powerful, flexible backup and recovery across hybrid physical and virtual environments. This latest release builds upon the features and functionalities...
Hacker-resistant CCTV from TeleEye
Companies and individuals are increasingly turning to Webcams to help secure their premises. However, these high-tech solutions typically use Internet protocol (IP), an open standard, to connect back to control rooms. Like all open standards, IP can easily be hacked -...
Cisco expands malware solutions
Addressing the needs of South African customers to combat zero-day attacks and advanced persistent threats (APTs), Cisco is broadening its Advanced Malware Protection and Data Centre security offering. This will help in protecting against threats across the full...
Kaspersky offers World Cup travelling tips
If you still haven’t decided on how you plan to pay your bills while you’re in Brazil (should you be going) – cash or credit card – it is time to do so. Kaspersky Lab warns that Brazil has some of the most creative and active criminal’s specialising in credit card...
Hearts of Hope uses Accysys for security
When its existing access control and security system was disabled after being struck by lightning, Hearts of Hope, a Section 21 not-for-profit organisation focused on the welfare of vulnerable children, looked to Accsys for help. A replacement system was needed to...
Security is no longer a catch-up game
Up until now, security has been mostly a catch-up game. A vulnerability is discovered, a patch is issued and applied, and so on and so forth. However, as with all catch-up games, it will inevitably fail. By the time a new threat has taken hold, or the vulnerability...
Samsung, Microsoft partner on security
Samsung Electronics South Africa has announced that Samsung Knox will now support Microsoft’s Workplace, Join to Active Directory and the Windows Intune cloud-based mobile device management solution. This is in addition to the Cloud Printing solution which uses both...
10 steps to mitigate a DDoS attack
The threat posed by DDoS attacks is ever-growing and is something that continues to be a topic which interests and concerns businesses in equal measure. As the lines between the professional and social use of technology fade, it is even more important for us to...
CA Technologies releases Identity Suite
CA Southern Africa has announced the availability of CA Technologies CA Identity Suite, a new, one-stop identity management and governance solution that transforms data into business information and simplifies identity management and access governance across the...
Panda offers new Cloud Fusion
Panda Security has announced the availability of its new cloud offering, Panda Cloud Fusion, which combines comprehensive security, management and support in one solution. The new Panda Cloud Fusion offers significant benefits for organisations needing to manage and...
Two-factor authentication is a must
The repercussions of an online attack could be detrimental to a business, with both financial as well as reputation loss at stake, says Carey van Vlaanderen, CEO of ESET. With BYOD, mobility and cloud software becoming a standard for many companies, security should be...