Categories
Public

How To Survive Digital Disruption

A specter is haunting the economy – the specter of disruption. It is approximately as real as the specter of communism that Karl Marx and Friedrich Engels described in their ‘Manifesto of the Communist Party’. It has killed millions of people in just a few decades.

Categories
Public

Blue Coat DLP Appliances: Ease Deployment and Operational Complexity of DLP

Blue Coat Systems, Inc. introduced the Blue Coat Data Loss Prevention (DLP) family of appliances that ought to provide comprehensive data loss protection in a single integrated appliance to enable compliance without complexity. With the addition of the DLP appliances to its hybrid Secure Web Gateway solution, Blue Coat now provides protection against both inbound […]

Categories
Public

Modulo Risk Manager NG: Enterprise Governance, Risk and Compliance Solution

Modulo announced the availability of its next generation GRC management solution. Modulo Risk Manager NG is now available for fast and cost-effective deployment in the cloud as software-as-a-service (SaaS) solution.

Categories
Public

Symform Cooperative Storage Cloud 2.0: Secure, Fast and Cheap Disaster Recovery Solution

Symform, Inc. today announced the general availability of version 2.0 of the Symform Cooperative Storage Cloud. The new version ought to introduce laptop backup support and two key functions: Flexible Contribution and Instant Restore. Additionally according to Symform, the user experience has been redesigned and the speed of data throughput has been increased substantially.

Categories
Public

Sprite Terminator for Android: Anti-Theft Solution for Android Phones

Sprite Software today announced its Terminator anti-theft for Android software is now available. Sprite Terminator ought to allow users to remotely wipe data, lock, backup or track their mobile device. The solution was designed to address growing security concerns in the enterprise market where mobile devices create a high data risk.

Categories
Public

Juniper Junos Pulse and AppTrack: Solutions Redefine Security for Mobile Devices

Juniper Networks today announced the availability of Junos Pulse which ought to deliver integrated connectivity, acceleration, and security anytime, anywhere while enabling new service models for service providers. Juniper also announced the availability of AppTrack software, part of the AppSecure suite of security software that enables application-level visibility and control for its SRX Series Services […]

Categories
Public

Deepnet Mobile ID for Android: Android Phones Act as One-Time Password Tokens

Deepnet Security today announces support for Android phones on its mobile One-Time Password application, Mobile ID. Deepnet Mobile ID for Android application ought to enable users to transform their Android mobile phones into a One-Time Password (OTP) security token, providing strong authentication without the need to deploy or carry any additional, dedicated hardware tokens.

Categories
Public

Gartner: Organisations Reduce IT Security by 3 to 6 Per Cent

While security risks are not going away for companies, efficient and secure organisations will safely reduce the share of security spending by 3 to 6 per cent of their overall IT budgets through 2011, according to Gartner. Organisations with very mature and recently updated security programmes will be able to show even greater efficiencies. These […]

Categories
Public

Blue Coat Secure Web Gateway: Offers Complete Web Security and Lowers Cost

Blue Coat announced that it has bundled its Secure Web Gateway products to simplify the adoption of a comprehensive Web security solution and to lower the overall cost of that solution. The bundles ought to offer companies a layered defense to protect their Internet gateway connections, which combines in-line threat analysis, content controls, Web filtering, […]

Categories
Public

McAfee Total Protection for Server: Bundles Security and Compliance in a Single Offering

The McAfee Total Protection for Server software ought to be a comprehensive solution for security and compliance. It’s designed to ensure that mission-critical data and applications are protected with minimal impact to the performance and availability requirements of high-transaction servers. This software ought to protect against both targeted and insider attacks and ought to ensure […]