Cyber Resilience Cyber Resilience | Editor's Desk | TechTime | April 22, 2016 Choosing the Right Strategy for Secure, Reliable Wireless Healthcare By Areg Alimian, Senior Director, Solutions Marketing, Ixia Primum non nocere, or ‘First, do no harm’ is the guiding principle… Read More CCTV CCTV | Security Products | TechTime | April 20, 2016 Sony Introduces Industry’s Highest Sensitivity 4K Network Camera, SNC-VB770 New SNC-VB770 Combines Sensitivity, Color and Resolution for Range of Commercial Applications Compatible with a Variety of α E-mount Interchangeable… Read More ASEAN Tech & Security ASEAN Tech & Security | Asia Pacific Security | National | TechTime | April 18, 2016 Australia’s New Drone Rules: New Devils in the Details Whilst the Australian Civil Aviation Safety Authority has sought to widely promote its new drone rules as a boon for… Read More Cyber Resilience Cyber Resilience | TechTime | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cyber Resilience Cyber Resilience | Security Products | TechTime | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More ASEAN Tech & Security ASEAN Tech & Security | Frontline Security | Security Products | TechTime | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
CCTV CCTV | Security Products | TechTime | April 20, 2016 Sony Introduces Industry’s Highest Sensitivity 4K Network Camera, SNC-VB770 New SNC-VB770 Combines Sensitivity, Color and Resolution for Range of Commercial Applications Compatible with a Variety of α E-mount Interchangeable… Read More ASEAN Tech & Security ASEAN Tech & Security | Asia Pacific Security | National | TechTime | April 18, 2016 Australia’s New Drone Rules: New Devils in the Details Whilst the Australian Civil Aviation Safety Authority has sought to widely promote its new drone rules as a boon for… Read More Cyber Resilience Cyber Resilience | TechTime | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cyber Resilience Cyber Resilience | Security Products | TechTime | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More ASEAN Tech & Security ASEAN Tech & Security | Frontline Security | Security Products | TechTime | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
ASEAN Tech & Security ASEAN Tech & Security | Asia Pacific Security | National | TechTime | April 18, 2016 Australia’s New Drone Rules: New Devils in the Details Whilst the Australian Civil Aviation Safety Authority has sought to widely promote its new drone rules as a boon for… Read More Cyber Resilience Cyber Resilience | TechTime | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cyber Resilience Cyber Resilience | Security Products | TechTime | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More ASEAN Tech & Security ASEAN Tech & Security | Frontline Security | Security Products | TechTime | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
Cyber Resilience Cyber Resilience | TechTime | April 15, 2016 Blue Coat Launches Broad Cloud Security Ecosystem Cloud ready partner program aimed at easing enterprise cloud migration and decreasing risk; enables integration of services and applications to… Read More Cyber Resilience Cyber Resilience | Security Products | TechTime | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More ASEAN Tech & Security ASEAN Tech & Security | Frontline Security | Security Products | TechTime | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
Cyber Resilience Cyber Resilience | Security Products | TechTime | April 15, 2016 Blue Coat extends enterprise security leadership with comprehensive cloud security platform Addresses challenges of the cloud generation including shadow it, office 365; launches new cloud industry coalition Blue Coat has introduced a… Read More ASEAN Tech & Security ASEAN Tech & Security | Frontline Security | Security Products | TechTime | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
ASEAN Tech & Security ASEAN Tech & Security | Frontline Security | Security Products | TechTime | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
Cyber Resilience Cyber Resilience | Movers & Shakers | Security Products | TechTime | April 13, 2016 ISACA’s COBIT Framework Turns 20 More than 9 in 10 users say they would recommend COBIT 5 ISACA’s COBIT framework, which helps organisations of all… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Introduces The UltraLink Rugged Controller Remote management device for Senstar sensors with automated alarm response Senstar is pleased to announce the UltraLink Rugged Controller, a… Read More Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
Frontline Security Frontline Security | Security Products | TechTime | April 8, 2016 Senstar Announces Extended Range Detection Capability For Fiberpatrol-PR Intrusion detection system for fences now detects and locates intrusions over 50 percent further distance than previous capability Senstar is pleased… Read More Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next
Movers & Shakers Movers & Shakers | TechTime | April 4, 2016 ISACA Outlines Five Steps to Planning an Effective IS Audit Program A new report from global IT association ISACA identifies five steps organisations should take to create an effective audit program… Read More Previous 1 … 44 45 46 47 48 … 108 Next