Panda offers mobile device management
Panda Security has announced the introduction of significant enhancements and new features to Panda Cloud Systems Management (PCSM), the company’s remote management and monitoring solution designed to help IT departments and service providers manage, monitor and...
Kaspersky scores in AV-Comparatives test
Kaspersky Internet Security 2014, the security product for home users, was the top performer in the Malware Removal Test conducted by the independent AV-Comparatives lab in October and November 2013. The test assessed how well security products could help a computer...
Kaspersky signs deal with TSB Sugar RSA
Kaspersky Lab has signed a three-year deal with TSB Sugar RSA - one of the largest sugar producers in South Africa. With the assistance from Pronto Solutions Distributor, 1 200 endpoints will now be protected by Kaspersky Endpoint Security for Business, with...
Fighting DDoS attacks
Distributed denial of service, or DDoS, attacks can be hugely damaging to businesses that rely on their online presence for sales and new business - and DDoS attacks are undoubtedly on the rise. According to DDoS mitigation provider, Prolexic, the second quarter of...
14 security predictions for 2014
Check Point SA’s sales manager, Doros Hadjizenonos, looks back at how accurate security forecasts for 2013 proved to be, and gives his predictions for the year ahead. With the end of 2013 approaching, and in light of the signing into law of the recent Protection of...
2014 security predictions from Trend Micro
Trend Micro Incorporated has released its annual security predictions report, Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and...
ISPs key in fighting child abuse
With Google and Microsoft’s much-publicised efforts to clamp down on access to child abuse material from being available through a simple search online, the spotlight is on this crime worldwide. While the Internet search engines have introduced new algorithms that...
Cyberoam offers infrastructure security
Cyberoam, the leading global provider of network security appliances, has announced the availability of security for Industrial Control Systems (ICS) on its UTM and NGFW network security appliances. Until recently, organisations maintained their critical...
TruTeq introduces analogue camera interface
Truteq Devices, one of the leading wireless specialists in South Africa, is continuing with the introduction of new products for its growing range of wireless products and solutions, this time introducing the analogue camera interface. According to Derick Roberts, CEO...
eScan launches cloud security for businesses
eScan, one of the leading Anti-Virus and Content Security Solutions provider has launched its latest version of business security solutions – eScan 14 SMB Editions with Cloud Security, eScan 14 Corporate Edition with Cloud Security and eScan 14 Enterprise Edition with...
Panda protects smartphones, tablets
Panda Security has announced general availability on Google Play of version 1.1 of Panda Mobile Security, its solution for protecting mobile devices running Android. Among other features, this new release includes geolocation and anti-theft protection, allowing users...
Security in the network environment
Threats to network security are escalating dramatically. Technology advancements in social media, mobile devices, WiFi and cloud services are increasing a company’s vulnerability to attacks. Cyber risks and cyber-threats are a major concern for large revenue...