Technology
Centrify launches ‘MFA Everywhere’ initiative to secure enterprise identities against compromised credentials
Centrify’s MFA Everywhere provides turnkey, adaptive Multi-Factor Authentication (MFA) across the enterprise in Australia and…
ManageEngine Launches Privileged Identity Management Solution for SSH Keys
Key Manager Plus Centralises Control of SSH Keys, Provides Visibility into SSH Environment, Regulates Privileged…
Dell Security Multi-Engine Approach Advances Sandboxing Beyond Threat Detection to Complete Prevention with New SonicWALL Capture Advanced Threat Protection (ATP) Service
Industry-first, multi-engine approach to advanced threat analysis—that also supports prevention—delivers critical layer of defence to…
Government-Industry Partnership Drives Innovation and Secures Defence Jobs
Lockheed Martin Australia has been supporting the Jindalee Operational Radar Network (JORN) since 2003. The…
UL extends mobile product portfolio with Test Tools for M2M
UL is pleased to announce the release of two new test tools for Machine-to-Machine (M2M)…
WatchGuard Delivers High-Speed, Modular UTM Appliance
Firebox M4600 and M5600 provide distributed enterprises with security, speed, and flexibility WatchGuard Technologies has announced the…
Global mobile proximity payment users to surpass 1 billion by 2019
Mobile proximity payments are the smallest, but fastest growing segment for mobile payments, according to…
The Advanced Threat Platform that Connects Attacks Across the Internet with Internal Enterprise Networks
Empowering security teams to find and prove active attack campaigns 10x more effectively than SIEM…
Blue Coat and NetApp to provide high-density storage for industry-leading security incident response and forensics solution
New solution provides customers with significantly longer captured history of breach activity for more effective…
Verizon and Splunk join forces to advance threat detection for enterprises
Verizon enhances managed security services portfolio with Splunk security solutions Verizon Enterprise Solutions and Splunk…
Should organisations be collecting metadata?
The recently-enacted Amendment to the Telecommunications Act requires telecommunications providers to retain details of online…
Eight cyber security commandments all workers should follow
Despite the growing visibility of cyber security issues, many people still possess a relatively uninformed…
Ixia launches Vision ONE for end-to-end network visibility
Turnkey device optimises network security without sacrificing performance Ixia has launched Vision ONE. This turnkey…
Odebrecht Deploys Aconex for Panama City’s Second Metro Line
Collaboration Platform Drives Efficiency in Fast-Tracked Transportation Infrastructure Project Aconex Limited has announced that a…