EMC, Bidvest and DiData form partnership
Bidvest Magnum, Dimension Data and EMC Southern Africa have formed an alliance to provide South African organisations with solutions that enable them to streamline management of their physical security environments and to better leverage data for their physical...
Check Point announces R77
Check Point Software Technologies, a worldwide leader in securing the Internet, has announced the availability of Check Point R77, the latest release for its award-winning Software Blade Architecture. The Check Point R77 brings together preventative security...
McAfee online safety programme booms
McAfee has announced that it has reached more than 100 000 youth, parents and teachers around the globe with its cyber education programme. The McAfee Cares - Online Safety for Kids Program is a free school initiative that utilises McAfee employees, partners and...
Bitdefender upgrades Android Mobile Security
Bitdefender, the creator of innovative global antivirus solutions, has released the unique Bitdefender Mobile Security to protect Android devices from malware and keep users up-to-date on what apps might be doing with personal data. Bitdefender Mobile Security, which...
Biolock delivers access management for SAP
While security has always been a key concern for organisations, the growth in governance, risk and compliance (GRC) legislation means that it is more important today than ever before. For this reason, companies are seeking more secure ways in which to allow employees...
Protect corporate information with Kaspersky
Employee negligence poses a serious threat to the security of corporate confidential data. This is according to over half the respondents in the Worldwide Security Products survey conducted among major global companies by the research agency IDC in February 2013....
Westcon offers SonicOS 5.9
Westcon Security customers can now take immediate advantage of Dell Software’s largest release of its SonicOS operating system for the Dell SonicWALL Next-Generation Firewalls (NGFWs) and unified threat management (UTM), by way of SonicOS 5.9. According to Andrew...
Securing a business from data leaks
One of the biggest threats to businesses big and small could be sitting in an organisation right now. Insiders can reveal company secrets, bypass security controls and infect the network with malware - through malice, stupidity, carelessness or the unmonitored use of...
Incorporating security into facility design
Security within facilities – CCTV, access controls, alarms, fire detection and suppression and so on - is today increasingly integrated and digital, yet it is often an afterthought when a new building is designed, says Kobus Le Roux, national sales and marketing...
Avoiding the consequences of data loss
Protecting data has become of the utmost importance for organisations today, as information if the lifeblood of a business, says Gareth Tudor, CEO of Altonet. There are many consequences should sensitive information fall into the wrong hands, however, as the workforce...
Trend Micro verifies cloud security
As global companies continue to transition to the public cloud, cyber security remains paramount. To address this challenge, Trend Micro’s “Trend Ready for Cloud Service Providers” programme was established in 2012 as a testing ground to verify compatibility of the...
BYOD: securing the mobile business
Mobile threats are growing exponentially, as a flood of mobile devices is hitting the enterprise. If the past is anything to go by, 2013 will see an unprecedented number of threats hitting the mobile enterprise. Over and above lost and stolen devices, there are...