Cloud security key for company data
There’s been a proliferation of cloud service providers on the local scene and this has granted companies the privilege of greater choice around who to entrust their data. The right to choose is one that Richard Broeke from specialist managed IT security services...
Panda delivers security for mining industry
Minopex, a leading exponent in outsourced operation and maintenance of minerals and metals processing plants, recently installed Panda Cloud Systems Management (PCSM) as its IT management solution of choice. Prior to the adoption of PCSM, the company’s IT management...
How to choose a remote monitoring service
When Dr Rudolph Zinn of the School of Criminal Justice recently did intensive research on the nature of robberies and attacks, he revealed some interesting findings: one being that alarms and armed reaction services are not a deterrent for robbers any longer, says...
How to choose a remote monitoring service
When Dr Rudolph Zinn of the School of Criminal Justice recently did intensive research on the nature of robberies and attacks, he revealed some interesting findings: one being that alarms and armed reaction services are not a deterrent for robbers any longer, says...
Managing mobile security in South Africa
From smartphones to tablets, mobile devices continue to cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported, leaked, or lost while the BYOD movement has dramatically increased the number of...
Trustwave makes threat protection easier
Trustwave has announced new software that helps businesses better defend against the onslaught of security threats putting their confidential data and operations at risk – including advanced persistent threats, targeted malware and other forms of cybercrime – while...
Employee negligence risks company data
Employee negligence poses a serious threat to the security of corporate confidential data, according to more than half the respondents in the recent Worldwide Security Products survey by IDC. The companies identified this as a priority for 2013, and intend to work...
Legitimate sites can risk company data
Employees could be putting their company’s network and data at risk by visiting legitimate Web sites that have been secretly compromised with malware. This is according to Richard Broeke, sales manager at Securicom, a specialist provider of IT security services in...
Fortinet enhances firewall capabilities
Fortinet, a world leader in high-performance network security, has answered the question “what’s next in next-generation enterprise firewalls?” with new features within its FortiOS 5 operating system, which serves as the foundation for the company’s award-winning...
Centralising security management
Businesses of all sizes – and especially smaller organisations – often find that deploying and controlling workstation and mobile device protection is not an easy task. In this situation, centralised management tools can help, but barely half of companies understand...
Malicious e-mails abound in SA
Although cybercriminals and scammers are increasingly using social media to launch attacks on companies and individuals, they haven’t abandoned e-mail as a channel. In South Africa malicious e-mail traffic is amongst the highest in the world and so is the phishing...
Kaspersky named in Magic Quadrant
Kaspersky Lab is pleased to announce that it has been recognised in the Gartner Magic Quadrant for Mobile Device Management Software. Kaspersky Lab was one of 18 software providers – out of more than 100 which were evaluated – that meet the technical and business...