In a wide variety of stationery store, consumers need to have a certain flair to choose safe and reliable stationery products, because the intense market competition makes many manufacturers "mix" into the market, these products are cheaper ...
Tags: Stationery, Office Supplies
The major Telcos have launched dedicated web pages for consumers to pre-register interest for the Galaxy S5, including Optus, Telstra and Vodafone. Samsung took to the stage in Barcelona for its Mobile World Congress launch event this ...
Trend Micro’s Integrated Data Loss Prevention product has won DLP Solution of the Year at the prestigious Computing Security Awards. The internet security specialist was handed the award at a ceremony in London’s Russell Hotel ...
Tags: Trend Micro, clinch, DLP, award, London
BlackBerry's dramatic fall in the enterprise has left CIOs scrambling to pick a new mobile platform provider. Will it be Apple? Samsung? Or Microsoft? Or it will be all of the above. "The entire landscape has shifted in a very short ...
Tags: Samsung, Apple, Microsoft, Blackberry
Struggling smartphone maker BlackBerry has quantified just how bad business is at the moment, as users abandon its once-dominant platform. The company said it plans to record a GAAP net operating loss during the July to September quarter ...
Tags: Blackberry, smartphone, Consumer Electronics
From Clerkenwell, London, a new product called Keasy stands to make Blackberry's position in the smartphone market ever more fragile with the introduction of an on-screen physical keyboard. Blackberry's hold on the business market has ...
Tags: Blackberry, Keyboard Case
Mobile Helix, the enterprise application and data security platform provider, has launched Link, which it describes as the industry’s first pure HTML5 platform. Link unlocks enterprise productivity by combining unparalleled security ...
Tags: Mobile Helix, Link, HTML5 Platform
Security monitoring – the type involving traditional security information and event management (SIEM) – can be done in some public cloud environments, according to Gartner. And if you're using public cloud services, it's time to ...
Tags: Security, Public Cloud
Businesses that receive a court order for data similar to the one reportedly?handed to Verizon?by an intelligence agency have no choice but to comply and to take comfort in their immunity from lawsuits, an expert says.? In April, the ...
Tags: Computer Products, software
For a few months earlier this year, the personal data of customers of the Schnucks supermarket chain was exposed to hackers whose work went undetected until after a card processing company issued an alert about fraudulent activity on a ...
Tags: Hackers, Computer Products
nCrypted Cloud, a cloud data privacy company that brings world-class privacy to data stored on cloud storage providers such as Dropbox, GoogleDrive and SkyDrive, has announced the launch of its free nCrypted Cloud service. Nick Stamos, ...
Tags: Free Service, Image Data, cloud storage
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can ...
Tags: HP, Big Data Security Strategy, SIEM
McAfee is enhancing its business security platform by adding near real-time querying capabilities to its ePolicy Orchestrator software and by integrating it with its security information and event management (SIEM) product to automatically ...
Tags: McAfee, business security, real-time querying capabilities
RSA has unveiled a new tool designed to let enterprises detect security threats more quickly than current technologies permit by combining big data management and analytics approaches with traditional network monitoring and threat ...
Tags: RSA, security threats, big data management, analytics approaches