Digital signage: A sustainable advantage
The results from an extensive study into the carbon emissions of digital signage compared with those of traditional signage, released today, show that the carbon consumption …
Port and peripheral device security with Zlock
Zecurion released Zlock 2.5, a network endpoint solution that controls and manages computer ports and peripheral devices across the enterprise. Zlock 2.5 monitors and manages …
PGP unveils new encryption solution
PGP Corporation announced PGP Whole Disk Encryption Workgroup Edition, a full disk encryption solution specifically designed for small businesses and workgroup environments …
Turn mobile phones into hardware tokens
Celestix Networks released their HOTPin Two-Factor Authentication (2FA) system that employs mobile phones and Windows devices as high-security hardware tokens. HOTPin is an …
New storage solution from Netgear: ReadyNAS NVX
Netgear announced the addition of several new 4-bay storage appliances to its family of ReadyNAS products. The ReadyNAS NVX, which is designed for home offices, workgroups and …
Web gateway for Web 2.0 content control, content filtering and threat protection
Websense unveiled a secure Web gateway for Web 2.0 content control, content filtering and threat protection – the Websense V10000 secure Web gateway appliance. The …
New version of AppGate Security Server based on Open Solaris
Version 9 of AppGate’s Secure Access Solution introduces enhanced file access with files visible through an AppGate Client file browser window. With Open Solaris a free …
New enterprise-grade cloud storage
Zetta unveiled its on-demand cloud storage architecture Zetta Enterprise Cloud Storage, which enables businesses to quickly adopt storage-as-a-service without expensive or …
Risk monitoring framework from Aleri
Aleri announced the development of a Real-Time (RT) Risk Monitoring solution framework. The framework provides a template for rapid implementation of a customized, …
April threat forecast: Most prevalent spam and malicious messages
A new MX Logic Threat Forecast was released and here are the highlights. Conficker Given all the recent media attention surrounding the Conficker botnet, it’s not …
Study: Companies willing to switch backup vendors for integrated recovery management
CA announced the results of a global study indicating that while most enterprise and SMB IT organizations are satisfied with their current backup product, 70% of them would …
Spyware rose 10% in Q1 2009
According to the PandaLabs malware report for the first quarter of 2009, Trojans have accounted for 73% of all new malware created during this period. Nevertheless, one of the …
Featured news
Resources
Don't miss
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR
- Aim for crypto-agility, prepare for the long haul