McAfee transforms endpoint security market
McAfee has introduced two new suites: McAfee Complete Endpoint Protection – Enterprise; and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing...
Africa also urged to ‘mind the TMG gap’
George Zervos, EMEA sales director at Kemp Technologies, looks at Microsoft’s decision to "end of sale" its Threat Management Gateway and what it means for enterprise users across Africa. In September last year, Microsoft announced that it was discontinuing its...
Vivotek protects hotel guests
Hotels may be places of relaxation, but they require stringent security to protect guests and their valuables. South African Patrol Security, which provides guarding services at various Southern Sun hotels in KwaZulu-Natal, recently upgraded the surveillance system at...
Hybrid security solutions are effective
Cloud technologies are an important element of modern security solutions, but cannot protect computers without the support of local security tools. So the best way is to use hybrid solutions that incorporate local anti-malware technologies and simultaneously interact...
IPM can help thwart zero-day attacks
The saying "prevention is better than cure" can be applied to more than just human health. It pertains to everything. Even automobile companies advise buyers that their vehicles should undergo regular maintenance, because it is far more cost effective than having to...
Kaspersky blocks 99,8% of attacks
Kaspersky Lab announces that its security solution Kaspersky Internet Security 2013 successfully repelled the overwhelming majority of malicious attacks in a Real-World Protection Test conducted by the authoritative Austrian antivirus test laboratory AV-Comparatives...
Jasco boosts university’s security
The University of Pretoria has contracted the expertise of Jasco Security Solutions since 2004, to maintain and expand its fully-redundant Cosmos4 Alarm Systems at its campus grounds, which include its Main and Sports campus, Groenkloof, Onderstepoort, Mamelodi and...
Emulating the enemy
Threat emulation is a critical technique in achieving more effective network security. "Know your enemy as well as you know yourself" is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. However, one of...
Securicom launches ePurifier Version 5
Leading local IT security specialist has announced the launch of ePurifier Version 5 – a feature-rich cloud-based e-mail security and content management solution that provides unprecedented control and visibility of e-mail. Offering advanced features and greater...
AV-Comparatives rates Kaspersky highly
Kaspersky Anti-Virus 2013 has received the highest Advanced+ award following independent Performance testing by the respected research laboratory AV-Comparatives in May 2013. The series of tests are designed to evaluate the impact security software has on a PC’s...
McAfee, Intel deliver new security model
McAfee has announced McAfee LiveSafe service, the first unlimited cross-device security service to use cutting-edge facial and voice recognition technology to protect users' digital lives. Delivering on the joint vision with Intel to redefine the consumer security...
Enterprises need extra network security
Hackers are becoming more brazen and their attacks are growing increasingly sophisticated. Everyone appears to be fair game. In recent months, several major companies have fallen victim to attacks, including Apple, Microsoft, as well as social networking sites Twitter...