PVision arms 2RM with video solution
Local display technology provider, PVision, has concluded an agreement with one of the South Africa’s foremost security and risk management groups, 2RM Security, to furnish a new Johannesburg command centre with advanced video technology and applications. The...
Reasons to renew security software licenses
Security software is something every person with a computer and an Internet connection should have to protect personal information from a wide variety of cybercrime threats, says Fred Mitchell, Symantec business unit manager, Drive Control Corporation. However, having...
Check Point introduces security for SMBs
Check Point Software Technologies, the worldwide leader in securing the Internet, has launched its new 600 Appliances, delivering a powerful security solution to protect small businesses against the latest cyber-attacks, including viruses, spam, malicious Web sites,...
Why the cloud requires agentless security
Virtualised desktops, servers, data centres and cloud computing solutions should be afforded the same level of security as physical machines, is the word from global security specialists Trend Micro. According to Trend Micro country manager, Gregory Anderson, there...
Nedbank’s Approve-it reduces phishing
It is a year since the launch of its enhanced Internet banking security feature Approve-it, and Nedbank reported a reduction of 99% in phishing losses when compared to the same period in 2011. The bank also confirmed that over 16-million secure online transactions...
Managed services for endpoint security
Mobility has created a number of challenges for information security, most originating from the reality that sensitive information is accessible from just about anywhere on any number of devices. The traditional castle and moat model, where company data was housed on...
Sophos ensures secure Web surfing
Sophos has announced the latest version of its unified threat management (UTM) solution, UTM Connected. This release introduces expanded UTM managed endpoint protection with Web in Endpoint functionality, broader wireless coverage for large scale wireless deployments...
The dangers of BYOD implementation
According to a Forrester survey carried out in Q4 of 2012 75% of company employees across the globe want to use their personal mobile devices for work on a daily basis. This is a 3% increase from the figures in 2011. Most (76%) of this group is specifically interested...
Cyberoam strengthens security for SMEs
Extending its future-ready NG series UTM lineup for small and medium enterprises, Cyberoam, the leading global provider of network security appliances, today announced addition of two new unified threat management (UTM) models – CR200iNG and CR300iNG. Addressing the...
Users’ online password strength poor
With the increasing importance of the online world and its impact on users' daily lives, today people spend more and more time online, using Web-based services such as social networks like Twitter, Linkedin and Skype, and e-mail and online banking. However, generally,...
Strong social media passwords are key
Last week (23 April), the Twitter account of the Associated Press (AP) news agency was hacked and subsequently sent out a hoax tweet reporting that President Barack Obama had been injured in an explosion in the White House. Within seconds, Wall Street was in panic...
How to secure multiple devices
Today most company employees use multiple devices to access business critical information within and outside of the organisation, writes Fred Mitchell, Security business unit manager at Drive Control Corporation (DCC). Computers, laptops, tablets and smartphones have...