PRODUCTS

Cyber Security Elements by NSS

15 January 2013

Power & Environmental Monitoring for Data Centre Racks

iMeter can monitor up to 496 of the following sensors from a single IP address: Current (Amps) using our unique intelliAmp® current sensor (pictured above) Voltage Temperature Humidity Airflow Water Leak Security (door contact or motion) Smoke   The unique combination of the sensors on offer means that IT and Facilities personnel can analyse the […]

Power & Environmental Monitoring for Data Centre Racks Read More »

Array Networks Recognized as Innovator in the ADC market

Info-Tech examined ADC vendors that are solving the problems of server downtime due to increased web traffic and preventing malicious attacks against corporate systems. Array Networks’ APV line of application delivery controllers deliver a seamless end-user experience while simultaneously preventing attacks and data leakage. Array’s feature-rich ADC products, industry-leading price and performance and unmatched reputation

Array Networks Recognized as Innovator in the ADC market Read More »

Microsoft extends anti-malware for XP. Here’s why you still need to upgrade!

Once Microsoft officially ends support for XP on Patch Tuesday in April (the last security update for XP), there will be no new security updates, non-security fixes, assisted support options, or online technical content updates from Microsoft. That means that XP users, even those with anti-malware protection from Microsoft or security vendors, will face significantly

Microsoft extends anti-malware for XP. Here’s why you still need to upgrade! Read More »

UTM and next-gen firewalls: What’s the difference? (Infographic)

As we explain below, next-generation firewalls are typically defined as firewalls enhanced with intrusion prevention and application intelligence. On the other hand, UTM systems include those features—plus additional technologies such as email security, URL filtering, wireless security, web application firewalls and virtual private networks (VPNs). In this view, UTM systems include NGFWs as components. Manager’s

UTM and next-gen firewalls: What’s the difference? (Infographic) Read More »

SophosLabs: Android malware intercepts SMS messages to steal banking info

One of our SophosLabs researchers, Anna Szalay, made an interesting discovery recently: a new type of Android malware that slips in through a security hole in the USB debugging feature that allows developers to modify their Android devices. Naked Security expert Paul “Duck” Ducklin reports that this malware can intercept your SMS text messages to

SophosLabs: Android malware intercepts SMS messages to steal banking info Read More »

Encryption Without Compromise: The New SafeGuard Enterprise 6.1

With version 6.1 we’re addressing the two biggest issues in encryption – performance and usability – by leveraging native operating system (OS) encryption for better performance; and delivering multi-platform management across all devices and cloud environments. SafeGuard Enterprise also solves the major challenge of managing encryption across multiple platforms, devices, and cloud environments. Users and

Encryption Without Compromise: The New SafeGuard Enterprise 6.1 Read More »

Infographic: Timeline shows 10 years of mobile device malware (2004-2014)

The current total of 650,000+ pieces of Android malware is up by approximately 600% from last January. Check out our mobile malware timeline below for our picks for the most important developments of the past decade, from the birth of mobile malware to today. Mobile Security Threat Report It’s been 10 years since the first

Infographic: Timeline shows 10 years of mobile device malware (2004-2014) Read More »

Sophos Mobile Control: Simplicity, Security and Scale Drive Momentum and Adoption

Sophos Mobile Control Protecting millions of mobile devices across tens of thousands of customer accounts, the latest release of Sophos Mobile Control (SMC) features an easy-to-use web-based console—deployed either on-premise or as a Service—to manage, protect and secure data. It delivers effective mobile device management to control the devices that access corporate systems. Using Sophos

Sophos Mobile Control: Simplicity, Security and Scale Drive Momentum and Adoption Read More »