Financial institutions at high risk
A financial institution not investing in a long term information security strategy is gambling with the protection of corporate and client data, according to information security experts at 4Di Privaca. The executive mind-set of viewing information security as a...
Cloud-based security is imminent
Cloud-based security services are gaining momentum as organisations look at smarter ways of managing their security strategies. Enterprise security no longer just encompasses firewalls and antivirus software, but a complex blend of secure e-mail and Web gateways,...
Biometrics leads in commercial security
For companies, knowing who a person is, where they are on the premises and why they are there - and validating this information - is the main driver behind security and biometric access control technology integration in the workplace. To this end, technology which...
Malware never sleeps
Malware is always changing, adapting, being rewritten and re-released in a seemingly infinite number of ways, with the express intention of making your life difficult – and making the writers or owners of the code as much money as possible. Security threats have...
McAfee transforms endpoint security market
McAfee has introduced two new suites: McAfee Complete Endpoint Protection – Enterprise; and McAfee Complete Endpoint Protection – Business. These suites are the first to link security from chip to OS to applications, protecting against new threat vectors and bringing...
Africa also urged to ‘mind the TMG gap’
George Zervos, EMEA sales director at Kemp Technologies, looks at Microsoft’s decision to "end of sale" its Threat Management Gateway and what it means for enterprise users across Africa. In September last year, Microsoft announced that it was discontinuing its...
Vivotek protects hotel guests
Hotels may be places of relaxation, but they require stringent security to protect guests and their valuables. South African Patrol Security, which provides guarding services at various Southern Sun hotels in KwaZulu-Natal, recently upgraded the surveillance system at...
Hybrid security solutions are effective
Cloud technologies are an important element of modern security solutions, but cannot protect computers without the support of local security tools. So the best way is to use hybrid solutions that incorporate local anti-malware technologies and simultaneously interact...
IPM can help thwart zero-day attacks
The saying "prevention is better than cure" can be applied to more than just human health. It pertains to everything. Even automobile companies advise buyers that their vehicles should undergo regular maintenance, because it is far more cost effective than having to...
Kaspersky blocks 99,8% of attacks
Kaspersky Lab announces that its security solution Kaspersky Internet Security 2013 successfully repelled the overwhelming majority of malicious attacks in a Real-World Protection Test conducted by the authoritative Austrian antivirus test laboratory AV-Comparatives...
Jasco boosts university’s security
The University of Pretoria has contracted the expertise of Jasco Security Solutions since 2004, to maintain and expand its fully-redundant Cosmos4 Alarm Systems at its campus grounds, which include its Main and Sports campus, Groenkloof, Onderstepoort, Mamelodi and...
Emulating the enemy
Threat emulation is a critical technique in achieving more effective network security. "Know your enemy as well as you know yourself" is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. However, one of...