Granite deploys security at Rustenberg mine
Rustenberg, in the North West Province, is well known for its mining operations. Boasting operations that mine everything from platinum to granite, the area has a number of specialist companies serving the sector, ensuring that the mines function as efficiently as...
KEMP strengthens load balance offering
KEMP Technologies, a leading price/ performance load balancer and application delivery controller, has announced the availability of its Edge Security Pack (ESP) in its LoadMaster product line of load balancer and application delivery controllers. The release will...
Fortinet introduces FortiWeb 5 OS
Fortinet, a world leader in high-performance network security introduced the next-generation operating system (OS) for its FortiWeb Web application firewalls product family, providing important new security advancements to protect against increasingly malicious...
A little security for big data
Bringing the issue of security into the big data discussion often produces two divergent schools of thought from IT professionals − categorical denial that big data should be treated any differently from existing network infrastructure, and an opposite response...
PVision arms 2RM with video solution
Local display technology provider, PVision, has concluded an agreement with one of the South Africa’s foremost security and risk management groups, 2RM Security, to furnish a new Johannesburg command centre with advanced video technology and applications. The...
Reasons to renew security software licenses
Security software is something every person with a computer and an Internet connection should have to protect personal information from a wide variety of cybercrime threats, says Fred Mitchell, Symantec business unit manager, Drive Control Corporation. However, having...
Check Point introduces security for SMBs
Check Point Software Technologies, the worldwide leader in securing the Internet, has launched its new 600 Appliances, delivering a powerful security solution to protect small businesses against the latest cyber-attacks, including viruses, spam, malicious Web sites,...
Why the cloud requires agentless security
Virtualised desktops, servers, data centres and cloud computing solutions should be afforded the same level of security as physical machines, is the word from global security specialists Trend Micro. According to Trend Micro country manager, Gregory Anderson, there...
Nedbank’s Approve-it reduces phishing
It is a year since the launch of its enhanced Internet banking security feature Approve-it, and Nedbank reported a reduction of 99% in phishing losses when compared to the same period in 2011. The bank also confirmed that over 16-million secure online transactions...
Managed services for endpoint security
Mobility has created a number of challenges for information security, most originating from the reality that sensitive information is accessible from just about anywhere on any number of devices. The traditional castle and moat model, where company data was housed on...
Sophos ensures secure Web surfing
Sophos has announced the latest version of its unified threat management (UTM) solution, UTM Connected. This release introduces expanded UTM managed endpoint protection with Web in Endpoint functionality, broader wireless coverage for large scale wireless deployments...
The dangers of BYOD implementation
According to a Forrester survey carried out in Q4 of 2012 75% of company employees across the globe want to use their personal mobile devices for work on a daily basis. This is a 3% increase from the figures in 2011. Most (76%) of this group is specifically interested...