Fortinet enhances firewall capabilities
Fortinet, a world leader in high-performance network security, has answered the question “what’s next in next-generation enterprise firewalls?” with new features within its FortiOS 5 operating system, which serves as the foundation for the company’s award-winning...
Centralising security management
Businesses of all sizes – and especially smaller organisations – often find that deploying and controlling workstation and mobile device protection is not an easy task. In this situation, centralised management tools can help, but barely half of companies understand...
Malicious e-mails abound in SA
Although cybercriminals and scammers are increasingly using social media to launch attacks on companies and individuals, they haven’t abandoned e-mail as a channel. In South Africa malicious e-mail traffic is amongst the highest in the world and so is the phishing...
Kaspersky named in Magic Quadrant
Kaspersky Lab is pleased to announce that it has been recognised in the Gartner Magic Quadrant for Mobile Device Management Software. Kaspersky Lab was one of 18 software providers – out of more than 100 which were evaluated – that meet the technical and business...
Financial institutions at high risk
A financial institution not investing in a long term information security strategy is gambling with the protection of corporate and client data, according to information security experts at 4Di Privaca. The executive mind-set of viewing information security as a...
Cloud-based security is imminent
Cloud-based security services are gaining momentum as organisations look at smarter ways of managing their security strategies. Enterprise security no longer just encompasses firewalls and antivirus software, but a complex blend of secure e-mail and Web gateways,...
Biometrics leads in commercial security
For companies, knowing who a person is, where they are on the premises and why they are there - and validating this information - is the main driver behind security and biometric access control technology integration in the workplace. To this end, technology which...
Malware never sleeps
Malware is always changing, adapting, being rewritten and re-released in a seemingly infinite number of ways, with the express intention of making your life difficult – and making the writers or owners of the code as much money as possible. Security threats have...
McAfee transforms endpoint security market
McAfee has introduced two new suites: McAfee Complete Endpoint Protection – Enterprise; and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing...
Africa also urged to ‘mind the TMG gap’
George Zervos, EMEA sales director at Kemp Technologies, looks at Microsoft’s decision to "end of sale" its Threat Management Gateway and what it means for enterprise users across Africa. In September last year, Microsoft announced that it was discontinuing its...
Vivotek protects hotel guests
Hotels may be places of relaxation, but they require stringent security to protect guests and their valuables. South African Patrol Security, which provides guarding services at various Southern Sun hotels in KwaZulu-Natal, recently upgraded the surveillance system at...
Hybrid security solutions are effective
Cloud technologies are an important element of modern security solutions, but cannot protect computers without the support of local security tools. So the best way is to use hybrid solutions that incorporate local anti-malware technologies and simultaneously interact...