×

Warning

JUser: :_load: Unable to load user with ID: 3719
JUser: :_load: Unable to load user with ID: 3450

Displaying items by tag: Access

Telstra has released a free cyber-safety tool that parents can use to set time-of-day limits on kids’ calls and mobile web use.

Published in Telecoms & NBN
Tuesday, 01 July 2014 06:49

Verizon takes Aussie ID product worldwide

US telco Verizon has announced a ‘Smart Credential’ user authenticity system for global release. It was developed in Australia, by Verizon’s team in Canberra.

Published in Security

A variety of developer tools, frameworks and libraries exist to simplify the goal of supporting multiple types of device from a single codebase. One of the latest is Embarcadero FireDAC which supports a wide variety of databases and platforms.

Australian Hearing Implements Oracle® Exadata Database Machine and Oracle E-Business Suite

Meru Networks, Inc. (NASDAQ:MERU), has announced the availability of the AP110 access point, a new low-cost wireless and wired access solution for branch offices, telecommuters and mobile or travelling individuals. The Meru AP110 enables simple, secure, virtualised Wi-Fi access to corporate networks, applications and resources and eliminates the need for costly VPN infrastructure. The Meru AP110 reduces cost, provides broader connectivity options and gives IT simple control of network access and services for remote users.

BalaBit IT Security surveyed IT professionals and found that in spite of the fact that 74% of them have already misused the company's IT system, and could have lost his/her job, if a video recording could have proven wrongdoing, 92% of those surveyed would not object to being observed by an activity monitoring tool.

Highly publicised data security breaches serve as important reminders that data access governance must be an ongoing corporate imperative. Too often, however, the process of controlling access to vital information assets is inefficient, ineffective and lacks the agility to adapt easily to dynamic growth and change. According to a Gartner report on security and risk management lessonsi, data access decisions should be based on an assessment of the risks and benefits of a given level of data sharing, as well as an assessment of the process, people and technology that can securely enable that sharing. As a leader in identity and access management, Quest Software utilises a six-step process for guiding assessments and improving data access controls.

Meru Networks, Inc., a pioneer in 802.11n wireless LAN, has announced that it has acquired Identity Networks, provider of the industry's most complete secure guest and device access management solution. Through the acquisition, Meru customers can easily provide secure, policy based, wired and wireless network access  for guests and employees that bring their own devices (BYOD) into the enterprise.

New remote access security solutions enable protected access to information from PCs and wide array of mobile devices

Wednesday, 14 July 2010 11:43

Patch Tuesday brings three critical updates

As foreshadowed, Microsoft released four security bulletins overnight. One affects Windows 7 and three are rated critical.

Published in Security

Next Tuesday will see the publication of four security bulletins from Microsoft, three of them rated critical.

Published in Security

Despite Twitter's hiccups today, Microsoft released the latest version of Office at a social media launch for consumers today in Sydney's Martin Place. Unlike previous versions, there won't be any upgrade prices although there will be several new purchasing options that can save consumers plenty from the full price.

Published in Mobility
Wednesday, 21 April 2010 09:06

Office 2010 prices set

Australian retail pricing for Office 2010 has been announced by Microsoft.

Wednesday, 06 January 2010 02:58

Office 2010 pricing announced

Microsoft has announced the U.S. retail pricing for its Office 2010 suite of productivity applications, which will be offered in four versions and two pricing levels.

Published in Development
Page 2 of 2

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments