Kaspersky Lab to optimise PC resources
Kaspersky Lab announces that its experts have developed and patented an advanced technology which optimises a PC’s use of computing resources. Patent number 2475819 registered by Rospatent describes a method of identifying and removing registry branches, files,...
CBD surveillance systems mature
As central business district (CBD) surveillance systems mature and expand, new add-on solutions with greater flexibility, functionality and control are being introduced, says Mark Chertkow, MD of Graphic Image Technologies (GIT). The challenge is to maintain the...
Defining a solid security strategy
IDC 2013 CIO Summit is currently underway in Cape Town this week – an event aimed at bringing insight into the key business strategies that CIOs need to consider in a constantly evolving business world. The theme of this year’s event is "Seize the Moment: Transform,...
The security landscape in SA in 2013
The big challenge within the South African security and innovations space today is the lack of competent expertise available in the market. Simply put, there are not enough trained people to do the design, installation and system audit work, which security projects...
ESET launches Secure Authentication in SA
Proactive digital protection vendor ESET has announced the general availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for small and medium businesses (SMBs). This simple and highly efficient application makes use of remote...
Sophos advances MDM for Android
Sophos has announced the latest version of its mobile device management (MDM) solution, Sophos Mobile Control 3.0, which is offered on-premise and as-a-service. This version includes support for Samsung SAFE devices, granting tighter control over how devices are used...
Detection, response is key for security
The real target for cybercriminals today is not technology. It’s the employee. With security measures being increasingly more effective, often the only point of entry to a company’s network for a cybercriminal is via an employee. In addition, the mobility of employees...
Vendors keep ahead of access control
In South Africa, service providers within the corporate security market are maintaining steady pace with the development of solutions designed to empower businesses to effective protect their environments. Management at ATEC Systems and Technologies (ATEC), a national...
Transaction security cost control in Africa
The African market is increasingly seeking more cost-effective solutions to the challenge of effectively securing electronic transactions, says Max Gysi, director for New Business at Stanchion Payment Solutions. The pan-African market is increasingly price sensitive,...
CA ARCserve simplifies backup, recovery
CA Southern Africa has announced enhancements to its CA ARCserve data protection solution aimed at simplifying backup and disaster recovery for physical and virtual server environments, while significantly improving performance, scalability and flexibility. The new...
Sophos extends UTM to the enterprise
Sophos has strengthened its network security offerings with two enhanced high-end unified threat management (UTM) appliances. These include Sophos UTM 525 and 625 as well as the new Sophos RED 50 (Remote Ethernet Device), the first security solution to offer complete...
Fujitsu announces PalmSecure
Fujitsu has announced the general availability of innovative authentication solutions based on its PalmSecure technology, which uses individuals’ unique palm vein patterns to combat identity fraud. With Fujitsu PalmSecure, a contactless scan of the palm vein pattern...