Security Featured Articles
Flowers Crossing Community Uses ControlByNet Solution to Protect Property
Flowers Crossing Community, located in a quiet suburb of Atlanta, GA., has been using ControlByNet cloud-based, hosted video security surveillance solutions to guard its property, as well as minimize day-to-day security worries.
Elliptic Technologies Adds tVault DTCP-IP to DTCP-IP Security Solutions Portfolio
Elliptic Technologies, a provider of embedded security hardware cores and software for SoC manufacturers, OEMs, service and content providers, recently revealed it has added the tVault DTCP-IP function to its suite of Digital Transmission Content Pro…
Orange Business Services Going After Growing Cyber Security Services
Whether a business is being run from a dorm room or is a multinational enterprise, security affects everyone doing business online. If the proper measures are not taken to defend your network, you leave yourself vulnerable to different forms of attac…
RedShift Networks Provides Security against Increasingly Sophisticated Attacks
Every day there are more diverse threats to networks - and the cloud is especially vulnerable.
RedShift Networks explains that a solution, Unified Communications Threat Management (UCTM), can protect cloud and enterprise environments where there a…
Columbitech Signs Deal with Cambridge First Responders
When it comes to VPN Security, there are a couple of firms who have been working hard with law enforcement and other first responders. ColumbiTech has risen to the top thanks to their contracts with law enforcement officials all over the United State…
Digicel Hopes to Acquire Myanmar's Telecommunications License with Newly Formed Consortium
Digicel Group Limited, a communications provider, reportedly forged a new consortium with the objective to win one of the two new telecommunications licenses announced by the Government of Myanmar.
PSIA Announces Availability of Access Control, Intrusion Detection Profiles for Physical Security Sector
The Physical Security Interoperability Alliance (PSIA) recently announced that its Access Control Profile and Intrusion Detection Profile is now available for the physical security sector. PSIA will also be providing a tool for testing product compli…
Worldwide PBX/IP PBX Market Drops 9 Percent in Q4 2012: Study
The PBX market - not including Micro PBX Products - dropped by 9 percent in Q4 2012, compared to the same time period in 2011, a new study reported.
According to MZA, the market also saw a 14-percent drop in the Below 100 Extensions Market when co…
U.S. Corporations and Customers Highly Vulnerable to Fraud Schemes and Identity Theft, Says SecureLogix
SecureLogix, a voice and unified communications security company, published the '2013 Voice/UC State of Security Report,' which revealed that U.S. Corporations and their customers are more vulnerable to fraud schemes and identity thefts facilitated t…
Vitesse Rolls Out Intellisec Security Encryption for Communications Networks
Security breaches over the Internet have intensified the need for critical network infrastructure protection, especially as more enterprises and carriers move to cloud-based models. With this in mind, Vitesse Semiconductor Corporation, a provider of …
NTT America Offers Best-in-Class Cyber Security to Communications Providers
The COMPTEL PLUS Spring 2013 Convention & EXPO will see involvement from NTT America as a Gold Sponsor. The finest networking event, COMPTEL PLUS is being held at the Aria Resort & Casino in Las Vegas, Nevada.
COMPTEL characterizes the spirited c…
VoIP-Pal Receives Patent for Eavesdropping Technology
As more people switch away from the traditional switched telephone network and migrate toward VoIP calling, traditional wiretapping techniques from law enforcement have become obsolete.
A Group of Six Free-Market Groups Urge the FCC to Move to IP Transition
Monolithic governmental organizations usually take a significant amount of time in order to reach to a decision. Considering the effects of the decisions they make it is quite understandable, but certain situations demand expediency.
Testing between Prognosis VoIP Monitor 4 Solution and Cisco Unified Communications Manager is Successful
Integrated Research Ltd. (IR), a Sydney, Australia-based company that develops monitoring and diagnostics software, successfully completed interoperability testing between its Prognosis VoIP Monitor 4 and Cisco Unified Communications Manager 9.0.
USPTO Mails Notice of Allowance to Voip-Pal's Lawful Intercept Patent Application
The U.S. Patent and Trademark Office (USPTO) recently sent the Notice of Allowance to Voip-Pal's wholly-owned subsidiary, Digifonica (International) Limited, on its patent application, "INTERCEPTING VOICE OVER IP COMMUNICATIONS AND OTHER DATA COMMUNI…
Thales Key Management Appliance Achieves FIPS 140-2 Level 3 Validation
Thales, a provider of information systems and communications security solutions, announced its key management appliance e-Security keyAuthority has achieved Federal Information Processing Standards (FIPS) 140-2 Level 3 certification, regarded as one …
BICS Installs TelcoBridges' Tmedia Gateway Solution
BICS, a company working toward delivering best-in-class international wholesale solutions to any communication service provider worldwide, has recently installed TelcoBridges' Tmedia VoIP Gateway Solutions at its international points of presence.
CTX Virtual Technologies Debuts World's First Android Smartphone with Embedded Virtual Key
Operating under two different subsidiaries - Celluon Technology Holdings Ltd., a Canadian corporation engaged in the design and manufacturing of virtual 3D electronic projection; and Kaibida International Limited, a PDA, smartphone and telecommunicat…
Fortinet Introduces New High-Performance Security Blade
Fortinet, a provider of network security, announced a high performance security blade for the firewall, the FortiGate-5001C. The new FortiGate-5001C blade provides large data centers as well as private and hybrid cloud deployments with consolidated s…
iQsim's Mobile Robot Provides Many Benefits for Testing, Applications
iQsim's R400 Series Mobile Robot provides many benefits for testing procedures and applications.
The Mobile Robot is an open platform, Linux-based SIM server. It is a "perfect match for testing procedures such as QoS [quality of service], quality…
Matrix Comsec Announces Joint Interoperability with SURiX to Provide Enhanced Security Measures
A joint interoperability has been announced between a provider of IP-PBXs, VoIP Gateways and IP Phones, Matrix Comsec, and SURiX, a source of advanced door phone systems development in Latin America.
TeleCommunication Systems Wins $25M Delivery Order
The U.S. Army recently awarded TeleCommunication Systems Inc., a provider of mobile communication technology, a $25 million delivery order for Secret Internet Protocol Router and Non-secure Internet Protocol Router Access Point 1.2M Lite, a set of Ve…
Enterprise Security Today is a Living, Breathing and Changing Process
While every company takes at least basic security precautions - firewalls, etc. - many security experts say that today, that's not enough. Cyber criminals are becoming more sophisticated, better equipped and simply more determined, since the stakes a…
E-SBCs: Beyond Security
Enterprise session border controllers play a number of key roles in the enterprise network. Security is one very important function of the E-SBC, and just as a CIO would not tolerate connecting any server directly to the public Internet, or even to a…
Noesis Technologies Debuts ITU-T G729A-Compliant Voice Codec Hardware Accelerator
Usage of wireless communication systems, cellular mobile radio and VoIP technology these days has surged exponentially. Consequently, this growth has created a spurred need for bandwidth-efficient, high-speed quality voice coding algorithms.
Voltage Security Partners with Informatica
Voltage Security, a company that deals in data-centric security and key management solutions, recently announced that it has partnered with Informatica Corporation, an independent provider of data integration software. Voltage Security will integrate…
Mkryptor Meets Increasing Demand for Secure Communications
Earlier this week, with the launch of a foolproof, simple and cost effective e-mail encryption solution, legal professionals will find it easier to meet increasing demands for secure communications with clients.
Parvus Intros DuraMAR 31-5915
Parvus Corporation, a supplier of rugged commercial-off-the-shelf computing and IP networking subsystems, launched DuraMAR 31-5915, noted to be a lower-cost alternative for homeland defense and civilian mobile, tactical, vehicle, outdoor networking a…
Palo Alto Networks Broadens Partnership with Bradford Networks to Deliver a Secure BYOD Solution
Palo Alto Networks, a leading network security company, recently teamed up with Bradford Networks, one of the best choices to provide secure network access to personal and corporate issued mobile devices, to deliver a high-performance and integrated …
Cellcrypt Launches New Secure Conference Calling Product
Cellcrypt, a provider of encrypted voice calling and messaging for smartphones and tablets, has launched Cellcrypt Conferencing, the company's new secure conference calling product.
Apriva Awarded Contract to Enhance Secure Connections
A few days ago, a provider of secure end-to-end wireless transaction and information solutions, Apriva, announced that in order to enhance its Multi Carrier Entry Point (MCEP) Gateway, its Apriva ISS division has been awarded a contract modification …
911 Enable Introduces E911 Emergency Solution Capable of Supporting Microsoft Lync 2013
911 Enable (News - Alert) recently announced the introduction of E911 emergency solutions that have been designed to support Microsoft Lync 2013. As soon as Microsoft announced that Lync 2013 has cleared release for manufacturing (RTM) status and als…
MC-MLPPP: A New Conformance Tester from GL
Conformance testing is performed to verify whether a product or system meets some specified standard or not. Software conformance testing checks whether a product performs according to its specified standards.
Edgewater Networks' New Certification Service Opens its Interoperability Labs to Service Providers
By passing the criteria set by the newly launched Edgewater Networks' PBX interoperability certification program, service providers can leverage the company's own interoperability labs rather than investing in conducting testing internally.
Security at a Click with AhnLab's V3 Click
The Internet is swarming with worms, trojans and malware ready to enter computers and laptops once they have an entry point and sometimes even with an anti-virus and a full suite of security software installed. This could be because many data securit…
UnboundID Challenge Allows Service Providers, Telcos, Enterprises to Secure Identity Data Infrastructure
UnboundID recently announced the "UnboundID Challenge," to enable service providers, telecommunications companies and enterprises to secure their identity data infrastructure against software problems and risks, thereby avoiding outages similar to th…
To Secure Mainframe Infrastructure, SSH Communications Security Inks Enterprise-Wide Deal
To deliver licenses, maintenance and support in order to secure its entire mainframe infrastructure, SSH Communications Security, known the world over as the inventor of the secure shell protocol, has signed an enterprise-wide agreement with a top 10…
Dialogic BorderNet Family of SBC Solutions Recognized by Gartner
Dialogic, which provides solutions to mobile operators that help them enhance customer experience, announced it has been positioned as a Visionary in Gartner's Magic Quadrant for Session Border Controllers (SBC).
The recognition is attributed to D…
Telenor Connexion Introduces eSEC: Embedded Security-Enabled Communications
A critical part of an M2M service deployment program is improving privacy and security so that it is not exposed to fraud, misusage or hacking attacks. Telenor Connexion, a leading enabler of premium connected services for business and life critical …
ICAP Patent Brokerage Announces Sale of Four U.S. Granted Patents
ICAP Patent Brokerage recently announced the sale of four U.S. granted patents and one application relating to wireless video-telephony.
International Projects Fetching Comm-Works 60 Percent More Revenue this Year
Minneapolis-based Comm-Works, a global technology integrator for multi-site organizations, is one of the few companies that despite a bad economy, managed some serious growth and momentum.
It now anticipates a steep revenue growth from internatio…
Acme Packet Faces Security Challenges
Acme Packet, a provider of delivery networks, will be working with MTN Cyprus on a new offshoot of services.
One of the most well-known telecommunications distributors in the area, MTN Cyprus will be utilizing Acme Packet's online session control…
Reutech and Cellcrypt Develop Secure Voice Solutions for South African Government
To help South African government agencies in addressing the potential risks associated with the interception of sensitive voice communications, Reutech Communications, a provider of secure military communication solutions and Cellcrypt, a provider of…
Deutsche Telekom International Carrier Sales & Solutions to Set up IP PoP in Istanbul
Deutsche Telekom International Carrier Sales & Solutions (ICSS), the international wholesale arm of Deutsche Telekom AG, is expanding its international Tier 1 IP network into Turkey and setting up a new IP PoP (Point of Presence) in Istanbul.
HID Global Presents an All-in-one Web-based Solution for Credential Provisioning and Management
HID Global has been a provider of secure identity technology since 1991 when it was formed. It offersprofessional services, products, platforms and suites, meant to solve any personal or business need for identification and authentication, and to con…
EntroPay Withstands Layer 4 DDoS Attack with Help from Prolexic
Prolexic, a provider of Distributed Denial of Service (DDoS) protection services, stated that it helped virtual credit card website EntroPay recently ward off a high-volume Layer 4 DDoS attack.
The Entropay website lets users open and fund an acc…
Crossbeam Introduces Consulting Services Portfolio
Recently, Crossbeam Systems unveiled an expanded Consulting Services portfolio. This portfolio assists customers in successfully planning, designing, implementing and optimizing their network security infrastructure.
Trend Micro Expands its Consumer Strategy
It's a connected world. People are using laptops and other portable devices more than ever before to stay in touch with their work, and also their friends and family. But as people stay connected with the help of a plethora of devices, the dangers of…
Tie-Up between Bosch Security Systems and GreenPeak Creates New Revenue Stream for the MSOs
In an effort to enable the MSOs to expand their offering with the introduction of new services geared toward home security and home care, The Bosch division Security Systems and GreenPeak Technologies, have forged a strategic alliance.
Ixia Avails High Port Density Solution for Shipping Industry
Ixia has made available for shipment the BreakingPoint 20, a high port density solution.
Touted as the world's first 20-port, 10GigE blade capable of creating stateful application and security traffic on a massive scale, the BreakingPoint 20 is us…
Ecrio Delivers IMS Test Kit to NTT DoCoMo
Ecrio, one of the key suppliers of 4G-LTE client software for the mobile businesses, recently announced that it had delivered its interoperability testing suite for the IP Multimedia Subsystem (IMS) Services to NTT DoCoMo Incorporated.
Ixia Acquires BreakingPoint Systems
Ixia, a provider of IP network validation and network visibility solutions, recently completed the acquisition of BreakingPoint Systems, a company that deals in network security testing and optimization solutions.
eGestalt: Bringing Security and Compliance to the SMB
Organizations that set out to operate online and drive eCommerce interactions for revenue gain and profits are tasked with the protection of customer information. Same goes for those who operate in healthcare.
AirTight Rates 'Strong Positive' in Intrusion Prevention Analysis
AirTight Networks, a principal company for wireless intrusion prevention systems (WIPS) and other products that provide secure Wi-Fi access, just announced that Gartner has analyzed the firm's products and services, rating them at a "Strong Positive"…
Keyware Set to Offer a New Internet Sharing Application - SafeShare
Keyware, Inc., a provider of digital social supervision and security solutions for Internet access devices used in households and small businesses and maker of the award-winning Action Alert parental control software application, has announced a new …
New Enterprise-Class Security Management Platform NLSS Gateway 5000 Announced
The use of surveillance systems have increased tremendously as they are currently considered one of the most cost effective means to prevent and prosecute crime. And, wireless video surveillance networks are evolving and improving rapidly. However, m…
SolarWinds Expands its Network Management Portfolio with VoIP & Network Quality Manager
Having recognized a strong need for affordable, easy-to-use VoIP performance monitoring solutions for the companies deploying UC services, SolarWinds, Inc. has decided to offer SolarWinds VoIP & Network Quality Manager as a standalone product.
AirTight Introduces Secure, Economical Cloud Wi-Fi Solutions
Wireless security provider AirTight Networks has introduced a cloud Wi-Fi solution, which is enterprise-class and embedded with wireless intrusion detection and prevention.
The C60 platform doesn't have the security issues found in other Wi-Fi acc…
Possible Olympic-related Attacks has London Tightening Security, SecurEnvoy's 2FA Provides Data Security
The 2012 Summer Olympic Games is set to start in London, England, on 27 July and run to 12 August. In order to make the Games safe and secure for the athletes, spectators, residents and commuters, the local security forces, including Britain's milita…
Panda Security Introduces Panda GateDefender Integra eSeries Security Device
Panda Security, a reputable provider of cloud-based security solutions, has launched the Panda GateDefender Integra eSeries unified perimeter security device. The device offers protection against all types of threats, accessible anytime from the clou…
Nomadix Unveils the New AG 5800 Internet Access Gateway
Nomadix, a distributor of public access gateways, stated that its new AG 5800 is a high-performance Internet access gateway that extends a wired or Wi-Fi network to create a public internet access network.
The AG 5800 is reportedly loaded with ne…
Apica Unveils an AMI for Apica ProxySniffer
Apica recently unveiled its AMI for Apica ProxySniffer, which provides mega load testing capabilities to Amazon Web Services users.
Apica ProxySniffer is a tool that allows the recording of load test scenarios through pre-surfing with any Web brow…
Your Critical Network: How to Protect Against Cyber Threats in 2012 and Beyond
Botnet infections, denial of services and exfiltration of data - these threats are all par for the course in cyber space, and they're only increasing in frequency and sophistication, threatening our most critical networks.
Protecting these networ…
New Study Reveals that Global Spending on Security Products and Services will Hit $19 Billion by 2016
A new study by New York-based Access Markets International (AMI) Partners, Inc has projected that global spending on security products and services (on-premise and cloud) by small and medium business will touch $19 billion by 2016.
W-Industries Deploys Waterfall Security's Unidirectional Security Gateways
W-Industries, a global technologies company with an international presence spanning the Americas, Asia Pacific, Europe, Middle East and Africa, has recently adapted Waterfall's Unidirectional Security Gateways to protect the attacks which originate o…
WISeKey Signs a Strategic Partnership with BOCO Inter-Telecom
One of the dangers facing every company is how to keep internal communications just that; internal. Sometimes, even the best infrastructure can find itself weakened due to the habits of the company personnel. WISeID Enterprise solutions from WISeKey …
Paessler Highlights Continuous Rollout Model
Germany-based network monitoring outfit, Paessler this week at Cisco Live was promoting its new continuous rollout model.
IronGate Security Networks' IHomeDefender Family Firewall Solution Now Available at Amazon.Com
IronGate Security Networks, a provider of unique family firewall systems called iHomeDefender, recently has established a direct sales channel with Amazon.com. Thanks to this partnership, consumers can now get iHomeDefender family firewall wireless s…
Online Security Products are Themselves Vulnerable - iViZ Security
It's the classic case of the hunter being hunted. The numerous security appliances and devices that claim to protect the customers from malicious activities online are prone to attacks themselves, as they have a number of vulnerabilities to deal with…
Bancaribe Curacao Bank Selects MPLS IP VPN Network from Level 3
Selecting the right telecommunications solution for a company's voice, video and data traffic can be difficult. Using an MPLS IP VPN network can help, as it offers privacy and advanced features not available with public IP solutions.
Level 3's de…
Lancope's StealthWatch Relies on NetFlow to Secure Service Provider Networks
Lancope, Inc recently announced the launch of a robust solution for protecting and providing high performance levels for service provider infrastructure. Lancope's StealthWatch System relies on NetFlow, IPFIX and other types of flow data to offer a c…
Lancope's StealthWatch Monitoring Show Floor Traffic at Cisco Live Conference
Lancope, Inc., a company specializing in flow-based security and network performance monitoring, recently stated that its StealthWatch System is monitoring show floor traffic at the ongoing Cisco Live, Cisco's annual IT and communications conference …
NSFocus Lets Businesses Run While it Handles Threats to Networks
With all of the recent cyber-attacks occurring on networks, enterprises have to be on guard around the clock. As the kinds of attacks become more sophisticated, one provider, NSFocus, has upgraded its products.
IPCopper's USC1030 Provides Advanced Network Monitoring and Forensics
IPCopper, Inc., a company designing and manufacturing network forensic and data security tools for both public and private sectors, has released its newest packet capture appliance which can log and detect even the newest threats that bypass and over…
IPCopper Advances Cybersecurity Industry with USC1030 System
Network security has become more vital than ever in today's digital age. With groups like Anonymous hacking the networks of huge corporations, it's clear a new level protection is required. IPCopper, Inc. hopes to have this next level of security emb…
Bill Banning VoIP Regulation Approved by California State Senate
A bill aimed at banning any future regulation of Voice over Internet Protocol (VoIP) by public utilities breezed through the California state Senate on Wednesday by a vote of 30-6, according to the L.A. Times.
The legislation, authored by state S…
TRENDnet Introduces New SecurView Pro IP Camera Management Software
TRENDnet recently announced the availability of the new SecurView Pro IP camera management software, which the company will provide with every new TRENDnet IP camera introduced within the market.
Ingate's SIParator E-SBC Now Interoperable with Positron's G-Series IP-PBX
Ingate Systems, a specialist in firewall technology to enable global SIP-based person-to-person communication, recently announced its SIParator Enterprise Session Border Controller (E-SBC) is now interoperable with Positron's G-Series IP-PBX solution…
GL Communications Enhances its PacketScan Software
GL Communications, Inc. has released its enhanced PacketScan software, an Ethernet/IP/VoIP Traffic Analyzer.
"PacketScan is a powerful software tool that features real-time capture of Ethernet, IP, VoIP and IP based Video traffic with extensive an…
FBI's New Surveillance Unit Targets Online, VoIP Communications and Social Networks
According to an article from the Verge, CNET reported today the FBI has quietly introduced a new Web surveillance unit, charged with developing new ways to intercept online, wireless and voice over IP (VoIP) communications.
The Bureau has been ge…
Acme Packet & NICE Systems Unveil New Session Recording System
Today, Acme Packet and NICE Systems announced a product geared toward offering a better solution in terms of session recording capabilities, powered for the first time by the SIPREC protocol.
The use of the SIPREC protocol in the Acme Packet / NIC…
TeleSign Upgrades Its PhoneID 2.0 Solution for Markets in U.K. and Germany
TeleSign recently announced that it has now released an advanced version of its PhoneID solution for customers across the United Kingdom and Germany. The company is one of the leading service providers of phone-based verification and authentication s…
Malware Problems Continue to Grow through Hotel Internet Services
Malware presents a growing threat through Hotel Internet Services. A recent post by the Internet Crime Complaint Center (IC3) states the FBI has issued an advisory to be aware of software updates popping up on the screen when users use the Internet c…
FBI Wants Expansion of CALEA to Cover New Technologies
With the recent passing of the Cyber Intelligence Sharing and Protection Act (CISPA) through the U.S. House of Representatives, reports have emerged suggesting the FBI wants an expansion to CALEA -the Communications Assistance for Law Enforcement Act…
SecureLogix Unveils Version 7.0 of its ETM System
The SecureLogix ETM System helps companies to secure, optimize and simplify management of complicated enterprise voice/UC networks. The system does this with the help of enterprise-wide voice network intelligence and unified policy enforcement. By pr…
Evizone Ltd Launches Freemium Service to Enable Workgroups Protect Communications from Cyber-attacks
Evizone Ltd recently announced that it is offering its no-files-left-behind service on a Freemium basis. Any workgroup that is interested in protecting internal communications from corporate espionage and cyber attacks can utilize this service.
Singlewire Software Releases Emergency Communications Software CallAware 2.0 for Organizational Security
Singlewire Software recently launched the Singlewire CallAware 2.0 software for recording calls and monitoring dialed numbers. The latest version of the software detects when a number has been dialed, for instance 911, and sends an alert message to a…
Rajant, SEE Enter Strategic Alliance
Rajant Corporation, the pioneer of Kinetic Mesh Networks and provider of pervasive, multi-frequency wireless solutions, recently announced in a press release that it has entered a strategic alliance with Safe Environment Engineering (SEE), a leading …
Enterprises Lack Security for Protecting Sensitive Databases, Suggests IOUG Survey
There's no better time to address the importance of data protection and control by securing enterprise databases, as "Organizations Are Not Doing Enough to Secure Enterprise Data," according to Chris Warticki in a recent report. Since corporate datab…
Flaw in Skype 5.5 Allows Hackers to Capture Users' IP Addresses
A tool recently published on Pastebin allows hackers to infiltrate Skype 5.5. Hackers can see anyone's vCard, get the person's real user IP address and obtain their PC's internal network card's IP address.
"This is an ongoing, industry-wide issue …
Mformation Partners with Bitzer Mobile to Secure Enterprise Mobility from the Cloud
With the proliferation of Bring Your Own Device programs at organizations around the world, mobile security is becoming a more complex issue for CIOs charged with keeping corporate data secure while handling a variety of mobile operating systems. In …
Kentrox Rolls Out New Security Management Module
Kentrox is a company that has long specialized in site management, monitoring and control solutions and the company does not rest on its laurels when it comes to attempting to perfect what it has to offer. The company has already improved on its base…
Vimicro Signs Strategic Agreement with Tianjin Samsung Techwin Opto-Electronic
Vimicro International Corporation, a multimedia semiconductor and IP-based surveillance solution provider, and Tianjin Samsung Techwin Opto-Electronic Co., Ltd., have formed strategic partnership to develop products for the China security surveillanc…
Stonesoft Executive Advisory Board Discusses Security Challenges
The executive advisory board at Stonesoft, an innovative provider of security solutions, which is comprised of companies on the Forbes Global 500 and several others met on April 23, 2012 to discuss the security challenges and threats posed by cyber c…
India to Implement Secure Phone System for Government
Focusing on the requirement of the Ministry/Department/State Government, in consultation with Ministry of Home affairs, the India Government is implementing a secure phone and communications system.
Due to the classified nature of intra-government…
Austrian Post AG Deploys ForeScout CounterACT to Counteract Network Threats
It took a security audit to make Austrian Post AG, a provider of mail shipping services in Austria, sit up and take note of how vulnerable it was to security breaches and it acted immediately to secure its defenses by selecting ForeScout CounterACT t…
TCS Intros Security Broker, Multimedia Communications
Provider of secure mobile communication technology TeleCommunication Systems (TCS) has expanded its Secure the Edge portfolio with the introduction of Security Broker and Secure Multimedia Communications.
To users, Security Broker provides multi-l…
North America Leads the UTM Market: Gartner
The money generated by the global unified threat management (UTM) market exceeded the $1 billion mark in 2011, fueled by the increased demand for the technology by the small and medium businesses in North America and Western Europe.