Please turn on your JavaScript for this page to function normally.
Opportunistic scanning from cloud to endpoint

iScan Online introduces opportunistic security scanning from the cloud to any device. They perform internal PAN, PCI and Vulnerability scanning without installing software or …

Firefox will block by default nearly all plugins

Following the recent debacle of the critical Java 0-day that was being actively exploited in the wild, in an attempt to minimize its users’ attack surface Mozilla has …

USBGuru simulated attack service

Wombat launched USBGuru, a simulated USB attack service to address the growing threat of fraud due to rogue memory devices loaded with malware. USBGuru is a …

DellKACE unveils appliance for improved endpoint security

Dell KACE unveiled the latest version of the Dell KACE K1000 Management Appliance, which includes expanded visibility into the network through support for new operating …

Comodo updates its Endpoint Security Manager

Comodo released a new edition of Comodo Endpoint Security Manager designed to assist businesses with locking down and centrally managing their laptop, desktop and server …

Wave Endpoint Monitor detects anomalous behavior

Wave Systems announced Wave Endpoint Monitor (WEM), a solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM …

Sophos delivers complete security in a box

Sophos announced Sophos UTM 9, specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. It provides complete security …

Nominum releases mobile security solution

Faster mobile networks, explosive consumer demand, more powerful smartphones, and the influx of non-handset mobile-ready devices make mobile networks an attractive option for …

Secure USB desktop environment for the enterprise

Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …

Hardening the endpoint operating system

Qualys CTO Wolfgang Kandek, talks about the effects of hardening the endpoint operating system and improving the resilience against common attacks. As the CTO for Qualys, …

A platform to stop APTs and malware

Bit9 announced the Bit9 Advanced Threat Protection Platform that protects all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus …

Webroot delivers endpoint protection

The security landscape has changed and traditional signature-based software can’t keep up. A recent study of IT decision makers found an overwhelming 95 per cent …

Don't miss

Cybersecurity news