PowerBroker Desktops (Client) (32-Bit)is a way to secure desktops by removing administrator privileges without end user disruption....
Showing results 1 to 20 of 861
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
A collaboration between the open source community and Rapid7, Metasploit software helps security and IT professionals identify security...
Dropbox has announced the launch of Dropbox for Business API to help enterprises address complex workload situations such as security and compliance, as well as encouraging collaboration.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The IT Infrastructure Library (ITIL) is the accepted approach to IT service management, it consists of a joined-up best practice framework....
Its kiteworks file-sharing platform extends existing content management systems to smartphones and tablets, while addressing compliance concerns.
Security checklists like the Australian Signals Directorate's Top 4 Mitigation Strategies are valuable, but to treat them as universal compliance mechanisms is a mistake. A risk-based approach is essential.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
While only a handful of Australian organisations have tapped into the application economy, the rest of the market is beginning to cement plans to do so in areas of API management, security, and DevOps.
CA Technologies has announced several management solutions to provide enterprises with greater overview and control surrounding application deployment.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Security, document management, open architecture and the ability to manage users over devices are critical components when picking an enterprise mobility management platform. But focus will matter too.
Following a similar move by Hewlett-Packard this week, Symantec confirmed on Thursday that it will indeed split into two companies.
In the red hot cloud computing market, major players such as Cisco, Dell, HP, IBM and VMware now offer their own distribution of OpenStack. Meanwhile, Piston Cloud is playing its security, management and installation as differentiators. Will it work?
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
Aimed at providing security and management capabilities, AppShield leverages the AirWatch SDK and App Wrangling capabilities.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
Box is also boosting cross-enterprise visibility as well as Security and Event Management (SIEM) integrations with HP and Splunk.