Deep Packet Inspection Engine Reduces Cost and Risk
Rohde Schwarz has recently demonstrated its deep packet inspection (DPI) that enables cybersecurity vendors to strengthen their solutions and hold off hackers. Ipoque, a Rohde Sc...
Rohde Schwarz has recently demonstrated its deep packet inspection (DPI) that enables cybersecurity vendors to strengthen their solutions and hold off hackers. Ipoque, a Rohde Sc...

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear to see as things get more streamlined and intuitive with every passing...

For many nations across the globe, the threat from international terrorism remains severe. Physical attacks, carried out by terror cells and radicalised individuals, in Barcelona, ...

Panasonic introduced a new end to end, cyber secure CCTV system at IFSEC 2017. The Secure Communication system is a secure platform and package of data protection elements that w...

ComNet Europe, part of ComNet Communication Networks, a USA-based manufacturer of transmission and communication networking equipment, has introduced a new Cybersecurity feature in...

What does a Hackathon, Bosch Connected World in Berlin and the new German Amazon Series of Matthias Schweighöfer You are Wanted have in common? A lot! Not only was the premier of t...

At the Mobile World Congress (MWC, February 27 to March 2, 2017) in Barcelona, Giesecke and Devrient (GD) will present a comprehensive portfolio of innovative identity management s...

Rittal continues to reinstate its strong presence in Middle East region with their Certified high-quality, system-tested Physical Security Systems for IT Infrastructure, displayed ...

Users of the Aiphone IX IP network PoE based intercom and security system are now able to remotely utilise many of its key features via their Android and Apple smartphones and tabl...

Data centres represent a key technology in an increasingly digitised world. They house the servers and storage systems with their associated network components so that applications...

BioID, a cloud biometrics leader, announced the availability of the BioID Facial Recognition app for iPhone and iPad. The free app enables developers and companies to add biometric...

Manufacturing industry can only gain speed and increase flexibility with consistent, IT-assisted value chains. A newly published whitepaper from Rittal shows why IT plays a key ro...

The palm sized 60GHz license-free link is part of the Etherhaul range of products and has the ability to transmit high volume video and data up to a distance of 500 metres and is a...

The 19-inch Infinity I4 systems with 4-U height are available from DSM Computer in three different models with Industrial ATX Mainboard, PICMG 1.0 or PICMG 1.3, the latter two as s...

The TPC-1840WP and 2140WP are 18” and 21” widescreen multitouch panel PCs, specifically designed to provide easier operation and boost productivity in manufacturing control environ...

DSM Computer has augmented its new ultra-slim panel PC family with the PN18-A2 widescreen model that provides a 47 cm (18.5 inch) TFT display with PCT multitouch screen and LED bac...

Advantech introduces the UNO-4683, a new IEC 61850-3 and IEEE 1613 certified substation computer based on Intel’s Core i7 processor, and four new UNOP plug-in modules for Ethernet,...

Experience the NextAxxon Next is best-in-class, new-generation Video Management Software that is based on open standards to offer a truly open platform. Axxon Next’s reliability, p...

GE Security: Unix platform with web-deployable Java thin client cuts support costs. GE’s Security business announced that its Picture Perfect v4 Unixbased enterprise access control...

Cyber-Ark Software: a set of business practices to increase security. The World Cup seems to have consumed all of our lives for the past few months. Scapegoats have emerged and so ...

GIT-Interview with Bruce Schneier about Infosecurity. Bruce Schneier is an internationally renowned security technologist and author. His first bestseller, ‘Applied Cryptography’, ...
Innominate: safe and secure remote maintenance. Remote maintenance is much more cost effective then on-site maintenance. However, to enjoy all the benefits, companies need to prote...
Fraunhofer Institute SIT: perils of networked IT security - challenges and approaches. IT systems of companies and administrations are more and more networked. At the same time org...

Infosecurity Europe 2008 - advice on the latest IT security threats. Many technologies displayed at Reed Exhibitions’ Infosecurity Europe 2008 in the Olympia Grand Hall, London, in...
Fraunhofer Institute SIT: secure transportation of voice data. Voice-over-IP (VoIP) is on a triumphal course through the global business world. Analysts estimate a rate of growth i...

Siemens IT Solutions and Services: biometrics for safe banking over the internet. The popularity of online banking is on the rise. Initiating transactions from the comfort of your ...
Information Security Forum: how to protect sensitive data. Data losses put focus back on classifying and protecting sensitive data, says a new report from the Information Security ...

IEIMobile, the branded mobile solution provider established by IEI Technology Corp. (IEI), announced the launch of the AVL-3000, a highly integrated auto data server designed for a...

UK government data theft - do we need a Data Breach Notification? The theft of CDs containing the personal information of 25 million UK citizens has rightly caused an out-pouring o...
Geutebrück: online tool Interactive Specifier Library. Geutebrück has presented its online tool Interactive Specifier Library that promises to eliminate paperwork and drastically r...
Security-Center: new motordome series. Below the new motordome series, Security-Center places small and economic cameras for controllable video surveillance.Its Eyseo Ecoline PT-do...
Interflex: chip cards for acces control. Intelligent RFID chip cards from Interflex, using the innovative „Network on Card“ technology, allow users to identify themselves and updat...
CDVI: keypad KCIN with remote electronics. CDVI has unveiled its latest product in the Digicode range: the KCIN.This is a backlit, coded keypad in stainless steel with remote elect...

Cyber-Ark Software: how to select a Password Management System. Sometimes when I look at envelopes I understand technology. When I was a student in college, I worked in the server ...

SSH Communications Security: securing security against the "triple threat". Even the best IT security technologies are useless if someone possesses the “triple threat” – the will, ...