Acts as a powerful gateway between the mail server and internet to provide real-time security to all email communications.
Sanovi was named in the IT DRM Exercising; Recovery Assurance; IT Service Failover Automation for DR; Data Dependency Mapping Technology; DR Service-Level Management categories.
First-in-kind solution helps businesses stop advanced, external and insider cyber attacks before they stop business.
Launched at re:Invent 2013, the new solutions offering from Trend Micro aims to simplify cloud security as a part of the AWS shared security model.
The critical and complex rise in DDoS attacks are forcing enterprises to protect their networks with new innovative solutions. Arbor Networks makes a foray in to filling this solutions gap.
Propalms, the first OTP solution provider, offers concurrent use licensing across software, mobile, SMS, PC, Web and hardware tokens.
Adobe said last week that attackers had stolen data of more than 38 million customer accounts, on top of the theft of information of nearly 3 million accounts that it disclosed nearly a month earlier.
Fear of attack is causing security professionals to shift focus away from disciplines such as enterprise risk management and risk-based information security to technical security.
Providers of AIS tracking system advised on possible inflection point.
Sophos Cloud release is aimed towards simplifying cloud security and enhancing protection, specially aimed at small and medium sized businesses.
Research reveals that Cyber Monday attacks impact enterprise losses in the million and yet 70 percent of organisations aren't taking additional precautions.
Community-sourced threat intelligence platform automates open sharing of security data to counter advanced cyber threats
CAPTCHAs are the squiggly letters, which are often blurred, smeared and cluttered with dots and lines to test whether the user is human or machine.
Most companies are required to share data breach details with clients, regulators, media, and other third parties.
Connectivity over security, risky online behaviour and increased use of mobile Internet contributes to increase in cybercrime.
When traditional security methods are put on a device that has lower battery, lower CPU, smaller screen size, a lot of the security elements are no longer usable.
Enables enterprises to combat security issues by providing flexible, robust and affordable solutions.
SAP Afaria mobile device management solution will offer security and management controls for Samsung KNOX devices.
For the governments and corporations facing increasing computer attacks, the biggest challenge is finding the right cyber warriors to fight back.
New solutions increase security effectiveness with accelerated big data analytics and real-time, application-level threat detection.
Zero-install, cloud-ready WatchGuard Dimension instantly distills 'oceans of security data' into key insights and trends.
FortiGate next-generation firewalls to be front line of defence for NEC's MasterScope Virtual DataCenter Automation software.
Helps organisations gain access to, understand, classify and defensibly dispose of outdated and unnecessary legacy information.
Features include advanced virus control, real-time control and two-way firewall.
According to Trend Micro, this volume is expected to exceed one million by the end of 2013.
McAfee comprehensive threat protection allows organisations to find, freeze, and fix advanced malware threats.
ZeroAccess is a sophisticated and resilient botnet, which has been active since 2011 and is one of the largest known botnets in existence.
The guide provides 20 risk scenario categories with potential responses.
Enables customers to manage the security of their data and infrastructure - from the device through the network and extending to third-party suppliers.
Android has long been the most popular platform for ordinary users and the cybercriminals who use malware to steal from them.