Size immaterial when it comes to security
IT security has no respect for size. A hacking group can have hundreds or thousands of members globally, like anonymous, or just a handful, like the group that mounted the successful Eurograbber attacks against banks in 2012 – but in either case, the disruption to the...
Bytes, OneVault offer biometric solution
Bytes Systems Integration has partnered with authentication service provider OneVault and will integrate OneVault’s hosted voice biometric solutions into its solution offerings. Bytes SI’s main focus lies in providing innovative solutions by integrating products,...
McAfee enhances Security Connected porfolio
McAfee has announced the addition of identity and access management solutions to its Security Connected portfolio. The new solutions that were previously sold and developed by Intel, include McAfee Cloud Single Sign On and McAfee One Time Password. McAfee also...
Insider data leaks a real risk for companies
South African companies are generally well aware of the dangers of external hacking attacks but often overlook the threat of internal data leaks – whether malicious or accidental. Companies in mining and construction tend be more vulnerable than they realise, and...
Gartner recognises Sophos as leader
Sophos has announced that it has once again been positioned in the “Leaders” quadrant of Gartner’s 2013 "Magic Quadrant for Unified Threat Management". The quadrant is based on an assessment of a company’s ability to execute and completeness of vision. Sophos is the...
Library security boosts asset management
Book theft, which has steadily increased over the past few years, is the most common crime in South African libraries and can have a significant impact on the bottom line. However, local developments of advanced library security technologies can reduce these losses,...
WatchGuard, Network Alliance join forces
National Information and Communication Technology service provider Network Alliance and global security solutions and services provider, WatchGuard, have joined forces to provide clients with up-to-date technology and reliable services to help them better protect...
Gateway encryption eases cloud concerns
Cloud computing has moved well beyond buzzword status to become a bona fide business-enabling technology area that can be used enterprise-wide, by sales, marketing, procurement and line of business, and for multiple purposes – including collaboration, says Tony...
Check Point introduces 13500 Appliance
Check Point Software Technologies, a worldwide leader in securing the Internet, has announced the launch of its 13500 Appliance, the first in a new line of 13000 Appliances designed specifically to expand the company’s data centre network security offerings....
Panda strengthens cross-platform security
Panda Security has announced the release of Panda Gold Protection, a new solution designed especially to protect users’ data, regardless of the device they’re using - whether it is a PC, Mac, smartphone or tablet. Receiving e-mail, shopping online, staying in touch on...
Security policies offer companies protection
Misuse of office computers does not just reduce productivity and waste time and money. More importantly, it puts corporate network security at risk, jeopardising critical data. Communicating on social networking sites or via IM, visiting entertainment sites, or...
Five tips for securing a wireless network
Sophos has suggested best practices that can help administrators go beyond the basics of wireless security to provide advanced security, manageability and accessibility. “It isn’t hard to set up security for the wireless router in your basement by changing the SSID,...