Please turn on your JavaScript for this page to function normally.
CCloud: Backup and sharing for Windows and Android

Comodo released a new edition of CCloud, a Windows client and a new CCloud app for Android. The Windows client now allows users to select the local drive letter that accesses …

Security main reason for stalled next generation data centre deployments

New survey results from Crossbeam identify network security as the number one reason IT organizations are stalled in their efforts to transition to cost- and energy-efficient …

Kaspersky PURE 2.0 Total Security released

Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection – …

Appliance for large-scale surveillance environments

Pivot3 announced the expansion of its vSTAC Watch product line with the introduction of the vSTAC Watch Enterprise, an enterprise-class Serverless Computing solution that …

AuthenTec combines fingerprint security with Symantec VIP

AuthenTec’s Eikon Digital Privacy Manager now comes pre-configured with Symantec Validation and ID Protection Service (VIP). The addition of Symantec VIP to Eikon …

Next Level Security Systems releases mobile apps

Next Level Security Systems released the NLSS Gateway 2.3, a new version of the NLSS Gateway that includes the power of a customized management tool, and NextMobile, a mobile …

Cisco and Lumos Networks prepare fiber infrastructure for 100G network

Lumos Networks, a fiber-based service provider, has successfully completed a technology test of Cisco’s 100G coherent DWDM solution across its service area. This …

Open source audit plug-in for MySQL

McAfee announced a free open source audit plug-in for MySQL database users to capture complete detailed activity audits from their databases. The plug-in was created and …

New cloud disaster recovery service

EVault announced a four-hour option for its Cloud Disaster Recovery Service (EVault CDR) with a guaranteed SLA. The EVault CDR four-hour managed service includes an SLA-backed …

Exploiting legitimate online technology

Criminals intent on distributing images of children being sexually abused are finding new ways of exploiting legitimate online technology, according to the Internet Watch …

Data center industry dynamics

While interest around data center services (DCS) is extremely high, the market structure, dynamics and maturity differ across the world, according to Gartner. The shift toward …

Microsoft disrupts massive cybercrime operation

In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …

Don't miss

Cybersecurity news