Security

LogMeInCentral antivirus management feature for remote PC monitoring

12 August, 2012

LogMeIn has released an update to its IT automation and management product, LogMeIn Central, that makes it easy to monitor and manage hundreds of versions of antivirus software through a single, centralised interface.


How to select a cloud storage provider

07 August, 2012

There’s a lot riding on your choice of cloud provider - pick the wrong one and you could end up a headline in the next data breach news story. However, picking between these providers can be confusing.


Blue Coat Cloud Service managed security service

03 August, 2012

The Blue Coat Cloud Service delivers robust threat protection that is backed by the Blue Coat WebPulse collaborative defence.


Kyocera Net Policy Manager secure printing program

02 August, 2012

The Kyocera Net Policy Manager (KNPM) is an economical and simple way for organisations to reduce document costs, introduce secure printing and adopt a sustainable printing strategy.


Websense Triton security architecture

16 July, 2012

Triton provides enterprises with the deep protection, forensics and visibility necessary to understand which individuals are subject to attacks, cybercrime tactics and methods, attack communications and destinations, and what data is being targeted.


F5 Networks IP Intelligence service

16 July, 2012

The IP Intelligence service is a cloud-based solution that enables organisations to safeguard their infrastructures by detecting and stopping access from IP addresses associated with malicious activity.


WatchGuard Fireware XTM 11.6 firewall operating system

16 July, 2012

Fireware XTM 11.6 includes performance and management enhancements that help administrators define, review and enforce network policies.


Symantec Instant Messaging Security.cloud (IMS.cloud), with support for Microsoft Lync

16 July, 2012

Symantec Instant Messaging Security.cloud (IMS.cloud), with support for Microsoft Lync, is now available. The product helps organisations that communicate using instant messaging platforms address their security and compliance issues.


Five tips for securing SharePoint data

18 June, 2012 by Kane Lightowler*

SharePoint’s ability to function as a data repository and a collaboration platform has made it popular with many organisations. As with any database of company data, security is paramount. Kane Lightowler*, Regional Director, Imperva Australia & New Zealand, provides five tips for securing corporate data in SharePoint.


W32.Flamer malware threatens Middle Eastern data security

29 May, 2012

Symantec is analysing a malware threat that it has labelled W32.Flamer, which the company says has been operating under the radar for at least two years, stealing documents and other user data, primarily from machines in the Middle East.


How to mitigate damage from a distributed denial of service (DDoS) attack

15 May, 2012 by Neal Quinn, Chief Operating Officer, Prolexic

Across the internet, distributed denial of service (DDoS) attacks continue to increase in size and intensity. Businesses can minimise the damage from a DDoS with a well rehearsed DDoS mitigation plan, or 'playbook'.


Adobe Flash Player zero day attack targets defence manufacturers

07 May, 2012

Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.


ESET Endpoint Security Suite for cybersecurity

07 May, 2012

ESET’s Endpoint Security Suite has been designed to provide ongoing protection against cybersecurity threats. The small system footprint, coupled with remote management of clients, make the solutions suitable for companies of all sizes.


Logicalis Virtual Workspace offers Citrix/Cisco solution to BYOD

30 April, 2012

Logicalis Virtual Workspace (LVW) combines Cisco and Citrix desktop and application virtualisation, voice and video technology via a small footprint, virtual environment, combined with mobile device management to address the security, storage, cost and productivity concerns around bring your own device (BYOD) computing and mobile workforces.


Booter shell scripts turn DDoS attacks into child’s play, warns Prolexic

27 April, 2012

DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd