August 28th, 2015 | ChannelPro
The new Managed Antivirus Engine is part of LogicNow’s Maxfocus product suite. - read more
August 26th, 2015 | Christopher Calisi
Keeping sensitive information secure goes past the network. Eavesdroppers can be as troublesome as hackers. - read more
August 25th, 2015 | Cecilia Galvin
The company offers security VARs training, tools, and certification for its active breach detection solutions. - read more
August 24th, 2015 | Al Colombo
Learn pros and cons of available video surveillance platforms, what remote video services are most in demand, plus tips on partnering with manufacturers and monitoring centers. - read more
August 21st, 2015 | SSI Staff
FireEye researchers have uncovered a new vulnerability with Android devices, in which hackers can remotely steal fingerprints to gain unauthorized access to a user’s phone and data. - read more
August 20th, 2015 | Martin Sinderman
Because anything with an IP address is a target for hackers and malware, it’s only a matter of time before MSPs and other IT pros will face a growing set of challenges in securing the IoT (Internet of Things) for those who use it. - read more
August 20th, 2015 | Cecilia Galvin
Partners can now offer the company's security awareness training to their customers. - read more
August 19th, 2015 | ChannelPro
2.4 GHz and 5 GHz WiFi-based systems provide long-range, point-to-point and point-to-multipoint surveillance coverage over distances up to five miles. - read more
Slide Gallery
August 18th, 2015 | TechDecisions Staff
We explain seven aspects of BYOD that you’ll need to think about before installing a system. - read more
August 18th, 2015 | CI Staff
Global Internet of Things (IoT) market is projected to grow exponentially in the next several years, according to a new market forecast. - read more


Subscribe to Security