BERKSHIRE, ENGLAND, November 16, 2012 /24-7PressRelease/ -- Panda Security, The Cloud Security Company, today announced the release of its new 2.2 version of Panda Cloud Partner Center, an integrated solution for centrally managing computer ...
Tags: Panda Security, Cloud Security, integrated solution, computer security
Partnership aims to avoid business disruptions and loss for Philippine local companies and SMEs MANILA, PHILIPPINES, September 10, 2012 /24-7PressRelease/ -- Acer Philippines and ShadowProtect software, through IT distribution company ...
Tags: Acer Philippines, Computer Products, ShadowProtect, Data
1. What's the difference between business relationship in China and in western countries? Unlike western business relationship which remains professional and perhaps, aloof, even after a long time, Chinese business relationship inevitably ...
Tags: Focus Vision, Business Etiquette, Business
FaxCompare discusses three new features to make these faxing innovations easier to understand and harness for your business communication needs. AUSTIN, TX, September 01, 2012 /24-7PressRelease/ -- As the virtual office trend continues to ...
Tags: FaxCompare, AUSTIN, Website Alleviates, Faxing Industry
New Orion license server release reduces complex deployment operations costs, and adds sales opportunity management and business intelligence capabilities. SANTA CLARA, CA, December 06, 2012 /24-7PressRelease/ -- Agilis Software today ...
Tags: Agilis Software, Orion license server, redistributed license server
The recently launched Adobe Reader and Adobe Acrobat XI come with new security features and an improved sandbox that will make the products harder to attack and exploit, according to Adobe. The sandboxing feature known as the Protected ...
Tags: Adobe Reader, Adobe Acrobat XI, security features, sandbox
A security researcher claims that he found 23 vulnerabilities in industrial control software from several vendors after a different security company last week showcased vulnerabilities in applications from some of the same manufacturers, ...
Tags: security researcher, vulnerabilities, industrial control software
Two digital rights group urged Facebook on Tuesday to halt changes to its governance and data use policies, warning the modifications could increase privacy risks. Facebook said last Wednesday it would no longer allow users to vote on ...
Tags: digital rights group, Facebook, governance, data use policies
Chief information security officers (CISOs) have an important role in moving their organisations, whether they are public or private, to a cloud computing environment, according to professional certification body (ISC)2. The move is ...
Tags: cloud computing, Chief information security officers, software, computer
Insurance company More Than is looking into technology to alert it to problems on its site after some web customers were affected by a glitch in the system. More Than's home insurance customers attempting to renew policies were told by ...
Tags: More Than, Insurance, web customer, insurance system
Google, Microsoft and Yahoo have remedied a cryptographic weakness in their email systems that could allow an attacker to create a spoofed message that passes a mathematical security verification. The weakness affects DKIM, or DomainKeys ...
Tags: Google, Microsoft, Yahoo, cryptographic weakness, email systems
Google is trialling an expansion of its search service to include Gmail messages, the company has announced. The limited trial was announced by Amit Singhal, Google’s search chief, who described the move as the latest step the firm ...
Tags: Google, Gmail messages, search engine, company news
Apple rarely admits anything is amiss, but in an email to an Australian iPhone 5 user, the company has apparently conceded that the iOS Maps app needs improvement. The Apple Maps application replaces Google Maps on the iPhone, but it is ...
Tags: Apple, iPhone 5, iOS Maps app, iPhone Software
Making good on the flash strategy it announced in August, Hitachi Data Systems has unveiled its first flash module, a 1.6TB SAS-interface flash card. Three months ago, HDS lifted the covers on its flash strategy saying that like EMC, it ...
Tags: Hitachi Data Systems, flash module, 1.6TB, flash card
Virtualisation can improve security, but only if it is done correctly, says Rik Ferguson, director of security research at Trend Micro. Improved security can be achieved in virtual environments because security can be abstracted away from ...
Tags: Virtualisation, virtual and physical servers, security products