RIM said that it cannot provide access to its enterprise email and messaging services as the company itself does not possess the encryption keys for the same.
Venkatesh Swaminathan, Country Head, Novell India, elaborates on the specific security challenges impacting SMEs and his recommendations.
The DRaaS will use Sanovi's CloudDRM software and Netmagic's multi-location DCIM services.
Man-made data security incidents outpace natural disasters for affected companies, says Quantum survey.
Hacking expert launches a $200 password-cracking tool that makes it easy to decipher Internet traffic sent through a widely used method for securing businesses communications.
Single authentication manager for multiple applications available in 3 editions -Standard, Professional and Enterprise.
AuthenTec is one of the very few public companies that Apple has acquired.
RSA FraudAction Anti Rogue App Service monitors for rogue mobile apps which target end user devices and data.
Websense CSI On-Demand and Live services help organisations pinpoint attack methods, processes and data targets for a more proactive stance on security.
Trojan hidden inside multi-platform Java attack designed to hit both Windows and OS X users.
Websense Security Labs tries to find out how an obvious fraud like this continues to reel people in.
FireHost sees a 69 percent increase in SQL Injection attacks between Q1 and Q2 2012.
IREO partners with IBM to ensure continuity of key business applications, reduces capital expenditure to the tune of 30 percent over 10 year IT deal.
The Virtuata team will join Cisco's datacentre group.
A cybercriminal, by a single targeted attack on the energy grid, could compromise anything from the lights and appliances in homes, to air defence systems.
Research from Varonis Systems has found 67 percent of respondents saying their senior management either don't know where all company data resides or are not sure.
Services can recover almost every bit of data from any instance of SSD failure.
During the first half of the year, the total number of daily targeted attacks continued to increase at a minimum rate of 24 percent, reveals Symantec.
Includes performance and management enhancements that help administrators define, review and enforce network policies.
Blue Coat Systems has introduced mobile applications controls in India, to prevent security breaches by unsanctioned mobile applications on the corporate network.
The company knows so far of about 300 corporate customers that have been affected, and about 60 consumer customers.
Yahoo said that hackers had taken advantage of a security vulnerability in its computer systems.
The Indian Navy has set in motion the process of recruiting its first batch of dedicated officers for Information Technology.
Websense TRITON solution provides the data-aware defences necessary to prevent today's advanced attacks that lead to data theft.
In the 21st century anything written down electronically, can be stolen or subpoenaed and come back to haunt the writer - and others - years later.
NTT Communications has integrated Juniper Networks security and remote access technologies into Mobile Connect, a new BYOD security service.
Phoenix Windows Data Recovery software V5 allows users to recover any kind of lost or deleted data after all instances of data loss.
Infected machines would have been unable to access the Web unless they were repaired, so authorities put the backup system in place as a stopgap measure.
About a quarter-million computer users around the world are at risk of losing Internet access on Monday, July 9, because of malicious software.
Backup Vault from Ace Data is a cloud-based backup and recovery solution for Indian businesses.