PRODUCTS

Cyber Security Elements by NSS

Uncategorized

WD Launches Fourth Generation WD Arkeia Network Backup Appliances

The new line up consists of four rack-mount appliance models with larger internal disk capacities, faster processors, increased memory, and integrated solid state drives (SSDs) to shorten backup time and accelerate data recovery. The bundled WD Arkeia v10.1 software delivers new support for “seed and feed” technology to support hybrid cloud backups. This allows companies […]

WD Launches Fourth Generation WD Arkeia Network Backup Appliances Read More »

New Apple iPhone 5s to feature “Touch ID” fingerprint authentication

The authentication system, based on a new material for the home button and a metal sensor ring around it, has been the subject of numerous rumours and leaked photos and specs already. Speculation about Apple’s interest in fingerprints goes back at least as far as 2009, resurfaces each time a new version of the iPhone

New Apple iPhone 5s to feature “Touch ID” fingerprint authentication Read More »

GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy!

What’s a CSR? If you have ordered an SSL Certificate before, you were most likely asked to provide a CSR. The CSR is used to deliver the public key that your server will use to identify itself. Generating a CSR can be a hurdle for non-technical staff that aren’t always familiar with the command lines

GlobalSign, New Tool Makes Certificate Signing Requests (CSRs) Easy! Read More »

Sophos announced Sophos Antivirus for NetApp 3.0!

The new release also brings reliability improvements and support for Windows Server 2012 and Windows Server 2012 R2. SAV for NetApp is also included in the following endpoint products and suites: Endpoint Protection AdvancedEnduser ProtectionEnduser Data SuiteEnduser Web SuiteComplete Security Suite To learn more, visit the Sophos for Network Storage page or download the free

Sophos announced Sophos Antivirus for NetApp 3.0! Read More »

Secure Google Docs email results in mailbox compromise

The email reads:     Hello,    A Secure Document was sent to you by your financial institute using Google Docs.    Follow the link below to visit Google Docs webpage to view your Document    Follow Here. The Document is said to be important.    Regards.    Happy Emailing,    The Gmail Team Phishing emails aren’t exactly rare, but this one

Secure Google Docs email results in mailbox compromise Read More »

Logpoint και SIEM. Adding more dimension to the modern CCTV system

Imagine a system that can alert you when it starts to rain, not only warning to get out your umbrella, but also putting more trains on the Metro to cope with the extra passengers, monitoring the cafes to ensure there is sufficient coffee, or alerting when a vending machine needs restocking. A tool that gives

Logpoint και SIEM. Adding more dimension to the modern CCTV system Read More »

‘Virtual Lolita’ bot imitates a schoolgirl to trap chatroom paedophiles

One of Negobot’s creators, Dr. Carlos Laorden, told the BBC that past chat bots have tended to be too predictable: “Their behaviour and interest in a conversation are flat, which is a problem when attempting to detect untrustworthy targets like paedophiles.” The most innovative aspect of Negobot may be a key differentiator that makes it

‘Virtual Lolita’ bot imitates a schoolgirl to trap chatroom paedophiles Read More »

Array Networks Ranked Second in Market Share in India for Application Delivery Networking

In comments that support Array’s ranking in the new report, IDC analysts note that the company’s WAN optimization solution has “increased its chances of cracking bigger deals and positioning themselves as an end-to-end solution provider in the ADC space.” According to IDC, drivers of Array’s leading position in the India market include the ability to

Array Networks Ranked Second in Market Share in India for Application Delivery Networking Read More »