New centralized management system from network security specialists Clavister

3 June 2009— IP-based security and unified threat management (UTM) specialist, Clavister has today announced the launch of Clavister InControl, a centralized management system which allows IT administrators to manage, optimize and deliver large scale, complex security services such as those delivered by Managed Security Service Providers (MSSPs) and Data Centers, better than ever before.

The much anticipated Clavister InControl allows organizations to manage up to 10,000 Clavister Security Gateways with up to 100 concurrent administrators and offers full control for organizations needing to manage global or geographically dispersed networks.

Read more: Stay InControl of the business network

1. Move to UTMs (unified threat management systems)   UTMS save money over multiple point solutions. They can cost just a quarter of the price of multiple solutions.   With UTMs you have fewer devices, so you can save on energy costs, rack space and air-conditioning. If you deploy multiple UTMs throughout an organisation, and use centralised management and reporting, you can significantly reduce the time spent on admin and management. There are also fewer ongoing management costs from factors such as training, maintenance and upgrades. And you only have one dedicated platform to support. Companies such as Check Point, WatchGuard and NETGEAR have solutions in this area   2. Beef up your web filtering   List-based web filtering security tools don't provide effective control against proxy anonymisers, which allow staff to browse restricted sites undetected by many web filtering systems.

Read more: Ten Tips To Keep IT Security Costs Down In The Recession

Oxford, United Kingdom, 2nd June, 2009 – Secerno, the technology leader in database security, today announced BT has signed up to its Security Consultants Programme (SCP). BT is the latest company to sign up to the SCP, joining Alcatel-Lucent and other Secerno consulting partners, who are using the SCP for application security consulting and also reselling Secerno products to customers globally.

BT will be deploying Secerno DataStream™ as an element of its security QuickStart portfolio. The BT Secure Networking Quick Start Service enables organisations to assess their network security rapidly; identify weaknesses; and then take cost-effective remedial and preventative measures. The service is a unique set of tools, experience and knowledge that draws on the expertise of consultants from BT’s testing teams.

Read more: BT Joins Secerno Security Consultants Programme

Cloud-based solution designed to protect laptops and mobile devices

London, UK - 2nd June 2009 - Trend Micro, a global leader in internet content security, today announced that it has been selected as the exclusive content security solution at The Carphone Warehouse, Europe's leading independent retailer of mobile phones. As part of the agreement, Trend Micro Internet Security Pro will be available immediately to The Carphone Warehouse customers via all of its UK stores and its online sales operation on purchases of mobile phones, laptops and smartphones.

“At Trend Micro we believe in making our highly effective content security readily available throughout the UK, giving consumers increased protection wherever they are and on whatever device they’re using to access the internet”, said Anthony O’Mara, Vice President at Trend Micro EMEA.

Read more: The Carphone Warehouse Combats Cyber-Crime with Trend Micro

29th May 2009 - The loss of personal details - including names, addresses, national insurance numbers and salary plus bank data - from The Pensions Trust could have been avoided if the laptop used by the organisation's contractor had used onboard encryption, says Credant Technologies. 

"The fact that the Trust is a not-for-profit organisation does not mean that it can bypass any of the stringent IT security safeguards or  require similar controls to be implemented by its contracting companies," said Michael Callahan senior vice president of Credant Technologies, the endpoint data protection specialists.

 

"Basically the data held on the laptop should have been protected by the highest possible levels of encryption, given the potentially serious consequences that could result from the loss of this type of information," he added.

Read more: Credant says 109,000 pension holder data loss could easily have been avoided if laptop had...