Technology -> Security
FICO Survey: North American Bankers Predict Rise in Delinquencies on Credit Cards and Consumer Loans - Nearly half of respondents forecast an increase in credit card delinquencies
Nearly half of respondents forecast an increase in credit card delinquencies, the highest level since 2011
Date: 8th April 2014 | Published By: FICO
Axiom Housing Association Chooses Panda Cloud Fusion to Protect and Manage Their IT Systems
Axiom Housing Association realizes significant cost savings and improved performance after implementing Panda Cloud Fusion to secure and manage their network. Panda offers calculator to check how much you can save annually
Date: 7th April 2014 | Published By: Panda Security
Fortinet Earns "Recommended" Rating from NSS Labs for the Company's APT Breach Detection Systems - FortiSandbox-3000D Achieves High Ranking for APT Threat Detection, Stability and Throughput
Fortinet today announced its FortiSandbox-3000D is one of the top rated Breach Detection Systems (BDS), delivering 99 percent breach detection and zero false positives, based on real-world comparative analysis conducted by third party NSS Labs.
Date: 4th April 2014 | Published By: Fortinet
Check Point ZoneAlarm 2015 Introduces Revolutionary Protection for Undiscovered Threats
New security product line fights web-based malware and brings industry-leading threat emulation home to consumers
Date: 4th April 2014 | Published By: Check Point
An Post Selects Good Technology to put Official Stamp on Mobile Security - The Irish post builds a firm foundation for increased mobility with Good for Enterprise
The Irish post builds a firm foundation for increased mobility with Good for Enterprise
Date: 3rd April 2014 | Published By:
FICO Launches Powerful Identity Resolution Engine That Helps Thwart Fraud Rings - 50+ algorithms scour multiple data sources to help defeat criminal rings that perpetrate fraud
FICO announces the general availability of FICO® Identity Resolution Engine 3.6, a powerful software solution that helps stop organised criminal rings by exposing links between one suspicious person or activity and others that have gone undetected
Date: 3rd April 2014 | Published By: FICO
Mimecast Brings Secure Enterprise Cloud Services to Mac Users - Launches Mimecast for Mac and upgrades Large File Send
mimecast the leading cloud email security, archiving and continuity service
Date: 2nd April 2014 | Published By: RealWire
Arbor Networks Unique Global Attack Intelligence Integrated into Local Protection - Arbor Reveals Security Research Capability and New Intelligence Feed Built Into Pravail Solutions
Arbor Networks announced today a new reputation-based threat feed as part of its ATLAS Intelligence Feed (AIF) service.
Date: 2nd April 2014 | Published By: Arbor Networks
Courion and Ping Identity to Explore Cyber Security Threats and Access Risk at London Event - Learn how identity and access management can help you better identify, mitigate and remediate risks
Courion and Ping Identity to Explore Cyber Security Threats and Access Risk at London Event
Date: 2nd April 2014 | Published By: RealWire
Staffvetting.com selects Becrypt End Point Protection security solution as part of Quality ISO270001 - Leading UK accredited provider of personnel vetting services provides peace of mind to customers
Staffvetting.com, the UK's leading accredited provider of vetting services to the private, public and third sector, has selected Becrypt disk encryption to protect its data.
Date: 2nd April 2014 | Published By: PR Artistry
OMV Group selects Active Risk Manager for integrated Audit Assurance - International Oil & Gas company extends its use of Active Risk Manager to include Audit Assurance
Sword Active Risk, a supplier of specialist risk management software and services, has been selected by international oil and gas company OMV Group to supply an integrated audit assurance solution.
Date: 1st April 2014 | Published By: PR Artistry
Key steps for protecting confidential corporate data in Europe - Drooms releases whitepaper following the U.S. National Security Agency data protection scandal
Drooms, the leading virtual data room provider, has outlined key findings from its whitepaper entitled: 'Europe after the data protection scandal: how can confidential corporate data be protected?'.
Date: 1st April 2014 | Published By: Drooms
Netwrix Combines IT with Neuroscience to Predict and Prevent Security and Compliance Incidents - New technology captures brain activity to predict actions of sysadmins before they happen
Netwrix has unveiled its new 'mind-reading' technology, which can wirelessly capture the brain activity signals of IT systems administrators via standard Bluetooth devices to predict their actions before they happen.
Date: 1st April 2014 | Published By: PRPR
Acronis survey reveals consumers' digital world at risk as majority are not protecting their data
World Backup Day on March 31st acts as a reminder for all consumers to protect their digital world
Date: 31st March 2014 | Published By: Acronis
NTT Com Security continues to build IT security leadership in Europe with BDG acquisition
NTT Com Security (formerly Integralis), a global player in information security and risk management, has acquired BDG GmbH & Co. KG, an IT security company in Germany
Date: 31st March 2014 | Published By: NTT Com Security
Barracuda to bring anti-spam solution to AWS Marketplace
Barracuda Spam Firewall now available to support customers migrating email security to the AWS Cloud
Date: 31st March 2014 | Published By: Barracuda
Sword Active Risk extends Audit Management capabilities with Active Risk Manager 7
Sword Active Risk, today announces the availability of Active Risk Manager (ARM) 7, which significantly strengthens the product's Audit Management offering.
Date: 31st March 2014 | Published By: PR Artistry
Panasonic Toughpad FZ-M1 secured by Becrypt for MOD and other security conscious markets - Panasonic & Becrypt address MOD requirements with CESG approved encryption for new 7 inch tablet
Panasonic and Becrypt have collaborated to secure the latest Panasonic Toughpad 7 inch rugged tablet for the encryption requirements of the MOD and other security conscious markets.
Date: 27th March 2014 | Published By: PR Artistry
StarChip Announces the StarBox V2, Its New Generation of Development Tools
Meyreuil, January 27, 2014 - StarChip®, experts in designing, qualifying and industrializing Smart Card integrated circuits (IC), today announced the release of its second generation of Smart Card development tools, the StarBox V2. StarBox V2 is the
Date: 27th March 2014 | Published By: NeonDrum
NTT Innovation Institute announces availability of 2014 Global Threat Intelligence Report - Analysis of 3 billion attacks reveals SQL Injections cost $196,000 & anti-virus fails half the time
NTT Innovation Institute (NTT Ił) announces its 2014 NTT Group Global Threat Intelligence Report (GTIR), which focuses on five critical areas of security: Threat avoidance, threat response, threat detection, investigative and response capabilities.
Date: 27th March 2014 | Published By: NTT Com Security
Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761