Next-generation firewalls: security without compromising performance
06 November, 2012 by Sandeep Joshi - Country Manager for DELL SonicWALL, Australia and New Zealand | Supplied by: SonicWALLIT managers in corporate and mid-size businesses have to balance both network performance and network security concerns. Earlier-generation firewalls pose a serious security risk to organisations today as their technology has effectively become obsolete, failing to inspect the data payload of network packets circulated by today’s internet criminals. Next-generation firewalls (NGFWs) have emerged as the solution to this thorny problem.
Passwords can be harvested from PCs in standby mode
21 August, 2012When a computer is switched off, any passwords you used to login to web pages, banks or other financial accounts evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole that exploits the way computer memory works and could be used to harvest passwords and other sensitive data from a PC even if it is in standby mode.
Eleven tips for SMB information security
15 August, 2012 by Michael McKinnon, Security Advisor, AVG Australia and New ZealandSmall to medium-sized businesses (SMBs) are becoming the preferred target of cybercriminals, since they are less likely to have strong security in place. Michael McKinnon, Security Advisor, AVG Australia and New Zealand, provides some tips for SMBs looking to reduce their chances of being compromised by cybercriminals.
LogMeInCentral antivirus management feature for remote PC monitoring
12 August, 2012LogMeIn has released an update to its IT automation and management product, LogMeIn Central, that makes it easy to monitor and manage hundreds of versions of antivirus software through a single, centralised interface.
How to select a cloud storage provider
07 August, 2012There’s a lot riding on your choice of cloud provider - pick the wrong one and you could end up a headline in the next data breach news story. However, picking between these providers can be confusing.
Blue Coat Cloud Service managed security service
03 August, 2012The Blue Coat Cloud Service delivers robust threat protection that is backed by the Blue Coat WebPulse collaborative defence.
Kyocera Net Policy Manager secure printing program
02 August, 2012The Kyocera Net Policy Manager (KNPM) is an economical and simple way for organisations to reduce document costs, introduce secure printing and adopt a sustainable printing strategy.
WatchGuard Fireware XTM 11.6 firewall operating system
16 July, 2012Fireware XTM 11.6 includes performance and management enhancements that help administrators define, review and enforce network policies.
Symantec Instant Messaging Security.cloud (IMS.cloud), with support for Microsoft Lync
16 July, 2012Symantec Instant Messaging Security.cloud (IMS.cloud), with support for Microsoft Lync, is now available. The product helps organisations that communicate using instant messaging platforms address their security and compliance issues.
Websense Triton security architecture
16 July, 2012Triton provides enterprises with the deep protection, forensics and visibility necessary to understand which individuals are subject to attacks, cybercrime tactics and methods, attack communications and destinations, and what data is being targeted.
F5 Networks IP Intelligence service
16 July, 2012The IP Intelligence service is a cloud-based solution that enables organisations to safeguard their infrastructures by detecting and stopping access from IP addresses associated with malicious activity.
Five tips for securing SharePoint data
18 June, 2012 by Kane Lightowler*SharePoint’s ability to function as a data repository and a collaboration platform has made it popular with many organisations. As with any database of company data, security is paramount. Kane Lightowler*, Regional Director, Imperva Australia & New Zealand, provides five tips for securing corporate data in SharePoint.
W32.Flamer malware threatens Middle Eastern data security
29 May, 2012Symantec is analysing a malware threat that it has labelled W32.Flamer, which the company says has been operating under the radar for at least two years, stealing documents and other user data, primarily from machines in the Middle East.
How to mitigate damage from a distributed denial of service (DDoS) attack
15 May, 2012 by Neal Quinn, Chief Operating Officer, ProlexicAcross the internet, distributed denial of service (DDoS) attacks continue to increase in size and intensity. Businesses can minimise the damage from a DDoS with a well rehearsed DDoS mitigation plan, or 'playbook'.
ESET Endpoint Security Suite for cybersecurity
07 May, 2012ESET’s Endpoint Security Suite has been designed to provide ongoing protection against cybersecurity threats. The small system footprint, coupled with remote management of clients, make the solutions suitable for companies of all sizes.