Security News - Page 2

eScan Launches MailScan 6.9 For Mail Servers

eScan Launches MailScan 6.9 For Mail Servers

.

Acts as a powerful gateway between the mail server and internet to provide real-time security to all email communications.

Sanovi Technologies Recognised As "Sample Vendor" In Gartner Hype Cycle

Sanovi Technologies Recognised As "Sample Vendor" In Gartner Hype Cycle

.

Sanovi was named in the IT DRM Exercising; Recovery Assurance; IT Service Failover Automation for DR; Data Dependency Mapping Technology; DR Service-Level Management categories.

CyberArk Introduces Privileged Threat Analytics To Detect In-Progress Attacks

CyberArk Introduces Privileged Threat Analytics To Detect In-Progress Attacks

.

First-in-kind solution helps businesses stop advanced, external and insider cyber attacks before they stop business.

Trend Micro Announces Security Solution For Amazon Web Services

Trend Micro Announces Security Solution For Amazon Web Services

.

Launched at re:Invent 2013, the new solutions offering from Trend Micro aims to simplify cloud security as a part of the AWS shared security model.

Arbor Networks Launches CloudSM DDoS Protection Services

Arbor Networks Launches CloudSM DDoS Protection Services

.

The critical and complex rise in DDoS attacks are forcing enterprises to protect their networks with new innovative solutions. Arbor Networks makes a foray in to filling this solutions gap.

Propalms ProID Multi-Factor Authentication Solution Launched For Enterprises

Propalms ProID Multi-Factor Authentication Solution Launched For Enterprises

.

Propalms, the first OTP solution provider, offers concurrent use licensing across software, mobile, SMS, PC, Web and hardware tokens.

Trove Of Adobe User Data Found On Web After Breach: Security Firm

Trove Of Adobe User Data Found On Web After Breach: Security Firm

.

Adobe said last week that attackers had stolen data of more than 38 million customer accounts, on top of the theft of information of nearly 3 million accounts that it disclosed nearly a month earlier.

Fear Of Cyberattacks Makes Enterprises More Vulnerable: Gartner

Fear Of Cyberattacks Makes Enterprises More Vulnerable: Gartner

.

Fear of attack is causing security professionals to shift focus away from disciplines such as enterprise risk management and risk-based information security to technical security.

Trend Micro Warns Of Vulnerabilities In Global Vessel Tracking Systems

Trend Micro Warns Of Vulnerabilities In Global Vessel Tracking Systems

.

Providers of AIS tracking system advised on possible inflection point.

Sophos Releases Strategy For Cloud Security

Sophos Releases Strategy For Cloud Security

.

Sophos Cloud release is aimed towards simplifying cloud security and enhancing protection, specially aimed at small and medium sized businesses.

RSA Finds: Cyber Monday Attacks Cost Cos Up To $3.4 Million Per Hour Losses

RSA Finds: Cyber Monday Attacks Cost Cos Up To $3.4 Million Per Hour Losses

.

Research reveals that Cyber Monday attacks impact enterprise losses in the million and yet 70 percent of organisations aren't taking additional precautions.

HP Enables Customer Collaboration To Create United Defence Against Cyber Attacks

HP Enables Customer Collaboration To Create United Defence Against Cyber Attacks

.

Community-sourced threat intelligence platform automates open sharing of security data to counter advanced cyber threats

Computer Cracks CAPTCHAs In Step Toward AI

Computer Cracks CAPTCHAs In Step Toward AI

.

CAPTCHAs are the squiggly letters, which are often blurred, smeared and cluttered with dots and lines to test whether the user is human or machine.

73% Cos Can't Keep Security Breaches Under Wraps

73% Cos Can't Keep Security Breaches Under Wraps

.

Most companies are required to share data breach details with clients, regulators, media, and other third parties.

Indians Most Impacted by Ransomware, Identity Theft And Phishing Incidences

Indians Most Impacted by Ransomware, Identity Theft And Phishing Incidences

.

Connectivity over security, risky online behaviour and increased use of mobile Internet contributes to increase in cybercrime.

Re-Thinking Mobile Security: Lock The App, Not The Device

Re-Thinking Mobile Security: Lock The App, Not The Device

.

When traditional security methods are put on a device that has lower battery, lower CPU, smaller screen size, a lot of the security elements are no longer usable.

AGC Networks Announces Cloud-Based Managed Network Security Solution

AGC Networks Announces Cloud-Based Managed Network Security Solution

.

Enables enterprises to combat security issues by providing flexible, robust and affordable solutions.

SAP, Samsung Collaborate To Securely Scale Android Enterprise Deployments

SAP, Samsung Collaborate To Securely Scale Android Enterprise Deployments

.

SAP Afaria mobile device management solution will offer security and management controls for Samsung KNOX devices.

Cyber Warrior Shortage Hits Anti-Hacker Fight

Cyber Warrior Shortage Hits Anti-Hacker Fight

.

For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back.

HP Helps Customers Disrupt Attacks With Real-Time Threat Detection

HP Helps Customers Disrupt Attacks With Real-Time Threat Detection

.

New solutions increase security effectiveness with accelerated big data analytics and real-time, application-level threat detection.

WatchGuard Technologies Brings Big Data Visibility Tools To Network Security

WatchGuard Technologies Brings Big Data Visibility Tools To Network Security

.

Zero-install, cloud-ready WatchGuard Dimension instantly distills 'oceans of security data' into key insights and trends.

Fortinet Secures NEC Cloud Platform

Fortinet Secures NEC Cloud Platform

.

FortiGate next-generation firewalls to be front line of defence for NEC's MasterScope Virtual DataCenter Automation software.

HP Autonomy Launches Legacy Data Cleanup Solution For Information Governance

HP Autonomy Launches Legacy Data Cleanup Solution For Information Governance

.

Helps organisations gain access to, understand, classify and defensibly dispose of outdated and unnecessary legacy information.

eScan Launches Total Security Suite With Cloud Security

eScan Launches Total Security Suite With Cloud Security

.

Features include advanced virus control, real-time control and two-way firewall.

718,000 Malicious, High-Risk Android Apps Found In 2Q13

718,000 Malicious, High-Risk Android Apps Found In 2Q13

.

According to Trend Micro, this volume is expected to exceed one million by the end of 2013.

McAfee Offers Solution To Remediate Advanced Malware

McAfee Offers Solution To Remediate Advanced Malware

.

McAfee comprehensive threat protection allows organisations to find, freeze, and fix advanced malware threats.

India Ranks Third Among Countries Infected By ZeroAccess Botnet

India Ranks Third Among Countries Infected By ZeroAccess Botnet

.

ZeroAccess is a sophisticated and resilient botnet, which has been active since 2011 and is one of the largest known botnets in existence.

COBIT 5 For Risk Provides Guidelines To Manage Increased IT Risk

COBIT 5 For Risk Provides Guidelines To Manage Increased IT Risk

.

The guide provides 20 risk scenario categories with potential responses.

HP Enhances HP Enterprise Security Services Portfolio

HP Enhances HP Enterprise Security Services Portfolio

.

Enables customers to manage the security of their data and infrastructure - from the device through the network and extending to third-party suppliers.

Over 50% Android Users Have No Security Software On The Device

Over 50% Android Users Have No Security Software On The Device

.

Android has long been the most popular platform for ordinary users and the cybercriminals who use malware to steal from them.