phone number

Archive for the ‘ARTICLES ’ Category

Australian Consumer Security Risks: Multiple threats in a multi-device world

Posted on: October 31st, 2014 by

By ASM

kaspersky_registered_partner.png

With every third of the world’s inhabitants a global network user, Kaspersky Lab, together with independent company B2B International, regularly conducts global studies in order to evaluate how Internet users react to online threats and how prepared they are against them.

The survey, which looked at consumer attitudes to and behaviours around IT security, was conducted across 23 global markets, with 405 Australians surveyed.

“The study highlights that Australians have a general awareness of a host of online threats, and are mindful that the businesses they entrust their information with are subjected to the same online threats as home users. While this awareness has revealed some positive trends, this is tempered by consumers developing skewed ways of viewing what is ‘secure’,” Andrew Mamonitis, Kaspersky Lab’s ANZ managing director said.

Webcams:

Users are adopting a range of tactics to avoid their devices becoming effective tools for cybercriminals. Globally, 21% of users cover up their webcams because they fear cyber-spies could be monitoring them via their computers. In some countries this figure is even higher, with 40% of Chinese respondents playing safe in this way.

In Australia, this figure sits at 14% and is significantly lower for mobile devices, at 5%. Overall, 84% of Australians surveyed have never covered the camera/webcam on their digital devices. This practice however, is much more likely to be used when dealing with desktops/laptops than with mobile devices, and is more common amongst younger respondents, more conscious of the interception of their online activities.

Cybercriminals have used webcams to steal company secrets or gain access to financial services, with one in ten respondents admitting to writing down their credentials on a piece of paper next to their computer.

To ensure that users are always aware of which applications and processes “see” via the webcam and thus protect their privacy, Kaspersky Lab has developed a special Webcam Protection module integrated into its latest 2015 security offering, Kaspersky Internet Security – Multi-Device.

Online security when using mobile devices:

Over a quarter of Australians surveyed – 27% – said they “would never consider using Internet banking on their smartphone or tablet.” This is up from 17% a year ago.

While 23% of Australians “feel absolutely safe from online threats when using their mobile device for web browsing,” 67% of Australians “believe that mobile devices are just as vulnerable as desktop/laptop computers when it comes to cybercrime.”

Online security when using social networks:

16% of Australians believe they “share more information than they probably should on social networks.” The global average is 21%.

Despite the rise of dating apps, only 6% of Australians surveyed indicated a tendency “to speak with strangers online about private topics/issues,” a figure that sits at half the global average.

Heartbleed:

With the recent disclosure of serious security bugs, “HeartBleed” only registered with a small proportion of global consumers, with the recent vulnerability forcing only 36% of respondents to think again about the security of passwords they use.

In Australia, 30% of Australians are either not aware or partly aware of software exploits and attempts to compromise their device using vulnerabilities in software. Of the Australians who are aware, less than half – 45% – are concerned about this issue.

The Consumer Security Risks report can be found here

The post Australian Consumer Security Risks: Multiple threats in a multi-device world appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Australian Consumer Security Risks: Multiple threats in a multi-device world

  

UL introduces the Collis Visa Cloud-based Functional Test Suite

Posted on: October 31st, 2014 by

By ASM

UL Logo

UL is pleased to introduce its Collis Visa Cloud-based Functional Test Suite that implements the Visa Cloud-based Payments Contactless Specification (VCPCS v1.4) through Visa’s related VCPCS test plan. This functional test suite helps Visa card issuers in testing and precertification of their Visa payWave mobile payment applications implemented as a Host-based Card Emulation (HCE) compatible mobile application.

Visa has introduced its new cloud-based payment specification allowing Host-based Card Emulation (HCE) mobile applications that can run without a need of using a secure element. This enables a mobile payment application to run directly in the mobile device’s application processor communicating with a contactless reader over the NFC communication protocol while supporting the Visa payWave transaction flow.

“UL continues to improve and expand the Collis test tool portfolio by developing high quality test tools for the payment and mobile markets, and we are very pleased to announce the new Visa Cloud-based Functional Test Suite that completes our portfolio of test tools dedicated to functional testing of card products based on Visa specifications.” adds Maxim Dyachenko, Manager Service Line Test Tools at UL’s Transaction Security division.

Based on the VCPCS v1.4 specifications and related test specifications defined by Visa, UL developed the Collis Visa Cloud-based Functional Test Suite to cover all Visa payWave transactions and test card image definitions. The test cases specified by Visa are implemented in scripts. For every test case there is a script that runs fully automated to perform the checks as defined by Visa. Card issuers can use the test suite to perform a pre-approval on their Visa payWave payment products. Pre-certified means that the smart card conforms to all requirements in the Visa Contactless Payment Cloud-based Specification (VCPCS) test specification, and should not encounter any problems during approval by Visa International. The tool supports the Visa defined JSON based personalization sequence to allow unattended automated testing.

For demonstration of the Collis test tools, visit UL’s booth 3E31 at Cartes in Paris from the 4th to the 6th of November.

For further information, please visit www.ul-ts.com

The post UL introduces the Collis Visa Cloud-based Functional Test Suite appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: UL introduces the Collis Visa Cloud-based Functional Test Suite

  

CyberArk Integrates Privileged Threat Analytics with McAfee’s Next Generation SIEM

Posted on: October 30th, 2014 by

By ASM

Cyberark Logo

CyberArk , the company that protects organisations from cyber attacks that have made their way inside the network perimeter, has announced the integration of CyberArk Privileged Threat Analytics with McAfee Enterprise Security Manager (ESM). The integrated solution empowers customers to pinpoint and immediately act against privileged-based threats in their security information and event management (SIEM) data.

Privileged accounts, which consist of IT administrative credentials, default and hardcoded passwords, application backdoors and more, are targeted in nearly every significant cyber attack. External attackers and malicious insiders exploit unprotected privileged accounts to move laterally and anonymously across the network, to access critical systems and exfiltrate data.

CyberArk Privileged Threat Analytics 2.0 collects and analyses privileged account activity data to provide organisations with visibility into potentially malicious behaviour. McAfee Enterprise Security Manager collects, correlates, and analyses intelligence and event data in real time and orchestrates adaptive protection to disrupt the attack chain and prevent data loss. Leveraging the McAfee data exchange layer (DXL), CyberArk’s full integration with McAfee Enterprise Security Manager will provide customers with more context to the information CyberArk Privileged Threat Analytics collects, while increasing the real-time visibility and the precision of actions that can be driven by the McAfee SIEM.

“Securing privileged accounts plays a critical role in protecting against advanced threats. Attackers exploit these powerful accounts to conduct network reconnaissance against security infrastructure and execute their attacks, often without detection,” said Roy Adar, vice president, product management, CyberArk. “The integration of CyberArk Privileged Threat Analytics with McAfee Enterprise Security Manager will help incident responders cut through the clutter of big data security analytics to pinpoint and enable action on previously undetected malicious privileged behaviour and disrupt in-progress attacks.”

CyberArk Privileged Threat Analytics reports on malicious privileged behaviour in real time over the McAfee DXL messaging bus, making it available to all McAfee products. McAfee Enterprise Security Manager reads the CyberArk Privileged Threat Analytics event data, and issues alerts, response and remediation activity in real time to threat response teams, and enables watch lists that can monitor and mine event data to detect related future and historical events.

Prompt action is part of how organisations shift from data historians to real-time incident management. For example, once a privileged user account is determined by CyberArk Privileged Threat Analytics to be associated with suspicious activity, McAfee Enterprise Security Manager can help disable, restrict, suspend, or reset the privileges of that user and the host. McAfee Enterprise Security Manager will also push security event information from critical systems to CyberArk Privileged Threat Analytics. This data will be analysed and correlated with privileged account information to detect anomalous privileged behaviour and user activities. The solutions will alert each other in real time about security events.

“Abuse of privileged credentials is a common thread between recent headline grabbing security breaches,” said Ed Barry, vice president, Global Technology Alliances at McAfee, part of Intel Security. “Timing is everything when dealing with advanced threats and having visibility into behaviour across the entire range of privileged account use greatly improves detection and remediation efforts. The integration with CyberArk’s product offering will enable our customers’ threat response teams to focus on privileged activity, detect suspicious events earlier in an attack chain, and have peace of mind that all endpoints and users are secure. We are excited to have CyberArk be one of the first Security Innovation Alliance partners to participate in the DXL ecosystem.”

The integration uses an innovative real-time messaging bus called the McAfee data exchange layer (DXL). Unlike point-to-point integrations that are expensive to implement and fragile, this new model provides more access to more information more quickly and reduces integration maintenance effort and dependencies. This data sharing and resilience enhances an organisation’s overall visibility and ability to adapt as threats change. By becoming “DXL-ready,” CyberArk Privileged Threat Analytics will also be able to selectively publish its data to and subscribe to updates from other products from McAfee and Security Innovation Alliance partners, without the cost and overhead of direct integrations. Organisations gain flexibility and simplicity as part of a more resilient security infrastructure.

Key benefits of the CyberArk/McAfee integration include:

  • Enables organisations to stop an in-progress attack before serious damage is done by focusing on privileged accounts, enabling a less costly and time-consuming remediation process.
  • Detects a range of anomalies in the behaviour patterns of individual privileged users in real time, such as a user who suddenly accesses credentials at an unusual time of day.
  • Extends effectiveness of McAfee Enterprise Security Manager by enabling incident response teams to identify anomalous privileged account user behaviour and prioritise incidents that involve privileged accounts.
  • Builds learned user behaviour into risk assessments over time to increase efficacy and build targeted analytics.

For more information, please visit http://www.cyberark.com/products/privileged-account-security-solution/privileged-threat-analytics.

To view a video introduction to CyberArk Privileged Threat Analytics, please visit: http://youtu.be/SCZYHMrLw6U.

The post CyberArk Integrates Privileged Threat Analytics with McAfee’s Next Generation SIEM appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: CyberArk Integrates Privileged Threat Analytics with McAfee’s Next Generation SIEM

  

New era for Australian Transaction and Reports Analysis Centre (AUSTRAC)

Posted on: October 30th, 2014 by

By ASM

crest_conventional

Paul Jevtovic APM has been appointed as the Chief Executive Officer (CEO) of the Australian Transaction Reports and Analysis Centre (AUSTRAC).

The agency provides intelligence that is critical to detecting and disrupting terrorism financing and money laundering in Australia.

Mr Jevtovic is an experienced investigator, intelligence professional and crime fighter.

His 33 years in policing and intelligence operations will activate a new direction for AUSTRAC.

Terrorists and criminals cannot operate without funds and Mr Jevtovic has the right vision to ensure AUSTRAC plays an integral part in our national security and crime fighting network to shut down the money trail.

Mr Jevtovic was recently responsible for the Australian Crime Commission-led Eligo Taskforce which tackled serious money laundering operations across Australia, so far seizing over $600 million in cash and drugs.

He is currently serving as Executive Director Operations in the Australian Crime Commission, and has acted as the CEO of the Australian Crime Commission for seven months. Prior to this, he was Deputy Director of the Victorian Office of Police Integrity.

These roles followed a 28-year career with the Australian Federal Police. Mr Jevtovic was awarded the Australian Police Medal in 2007.

Mr Jevtovic’s first priorities include delivering on the Coalition Government’s recent $20 million investment boost AUSTRAC’s ability to stop cash being funnelled to terrorists from Australia, and to crackdown on the money laundering of organised crime that funds the drug trade such as crystal meth.

He will also be reaching out to the private sector in order to build the relationship between AUSTRAC and the companies they regulate. It is critical that the burden of regulation is right and the fight against terrorism financing and money laundering is done through a partnership with the private sector.

I congratulate Mr Jevtovic on his appointment as CEO of an organisation which plays a vital role in protecting Australia from national security threats and serious and organised crime.

Mr Jevtovic will start in his new role on 17 November 2014.

The post New era for Australian Transaction and Reports Analysis Centre (AUSTRAC) appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: New era for Australian Transaction and Reports Analysis Centre (AUSTRAC)

  

ONVIF Connects with International Audiences at Security Industry’s Largest Trade Shows

Posted on: October 30th, 2014 by

By ASM

ONVIF Logo

ONVIF, the leading global standardization initiative for IP-based physical security products, hosted its 11th Developers’ Plugfest September 29-October 1 in Dusseldorf, Germany. With record numbers of interoperability implementations and multiple testings of ONVIF conformant video, access control and edge devices, this year’s Developers’ Plugfest was the most fruitful in ONVIF’s history.

The 2014 Developers’ Plugfest, held in conjunction with security essen, one of the world’s largest security trade shows, allowed member companies to verify their products’ ONVIF interoperability with other manufacturers’ products. This year’s Plugfest included 29 companies and more than 60 attendees. Plugfest attendees logged 249 hours of total testing time during the three-day event, with all of ONVIF’s profiles tested for interoperability. The profiles tested were: Profile S, for IP-based video systems; Profile C for IP-based access control; Profile G for edge storage and retrieval as well as the upcoming Profile Q for improved connectivity. Interoperability tests were conducted between a device and a client supporting both Profile S & G, as well as across profiles.

“Our Developers’ Plugfests provide a unique opportunity for technical experts to develop best practices and approaches that benefit the entire IP video industry, but they are just one way in which ONVIF interacts with the market,” said Per Björkdahl, Chairman of ONVIF’s Steering Committee. “Our activities at major industry events are an important part of how we garner feedback and direction from the market for our standards activities.”

ONVIF also hosted a public interoperability demonstration and reception during security essen on Sept. 25. ONVIF members showcased devices and clients that are conformant with ONVIF profiles, with a short address from Björkdahl about the benefits of standardization. ONVIF was also an exhibitor at the 60th Annual ASIS International Seminar and Exhibition, September 29-October 2, 2014, in Atlanta, Georgia, where ONVIF hosted conversations with conference attendees regarding their experiences with ONVIF in the marketplace, soliciting feedback regarding existing profiles and future opportunities.

With more than 500 members and more than 3,700 conformant products, ONVIF is the largest organization of its kind in the world. Since its inception in 2008, the organization has seen its membership grow by 25-50% each year, with the number of conformant products increasing by 250% in the last three years alone.

More information about ONVIF, including its members and conformant products, is available on ONVIF’s website: http://www.onvif.org/

The post ONVIF Connects with International Audiences at Security Industry’s Largest Trade Shows appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: ONVIF Connects with International Audiences at Security Industry’s Largest Trade Shows

  

Fortinet Delivers Flexible Advanced Threat Protection and Security Integration with New Virtual FortiSandbox

Posted on: October 30th, 2014 by

By ASM

Fortinet Logo

Fortinet a global leader in high-performance network security, announced that its FortiSandbox, which had a 99 percent breach detection rate in NSS Labs testing, is now available as a virtual appliance. This flexible form factor will enable customers to easily deploy Advanced Threat Protection (ATP) sandboxes within their infrastructure, in dynamic data centres, and across geographically disperse locations.

The latest FortiSandbox-VM release also features a new API for tighter integration with Fortinet’s other security solutions.  The first such product to leverage that API is FortiMail, with its new software v5.2, for better defence against email vector attacks.

This intelligent Advanced Threat Protection solution, supported by research from FortiGuard Labs, is expected to further accelerate the rapid adoption of Fortinet’s sandboxing beyond the more than 3,000 customers already using the solution to help defend their critical data from today’s highly sophisticated attacks.

“Enterprise security is a key focus for companies in Australia and New Zealand, with many looking to protect networks by using solutions that include physical and cloud-based elements,” says Kevin Dyson, vice president for ANZ at Fortinet.

“Without a doubt, a groundswell of sophisticated advanced persistent threats and serial high-profile data breaches have made enterprises more security conscious than ever,” said Tamir Hardof, vice president of product marketing for Fortinet. “Customers want solutions that are both highly effective and easy to deploy, and FortiSandbox offers them – effective breach detection that leverages the expertise and innovation from FortiGuard Labs, and the flexibility of physical, cloud, and now virtual form factors.”

Virtual FortiSandbox: Expanding Advanced Threat Protection
The new FortiSandbox-VM offering aims to expand advanced threat capabilities to a growing base of enterprise users by increasing flexibility and availability, enabling them to deploy scalable sandbox technology both easily and affordably. Fortinet already offers sandboxing in both cloud and physical appliance form factors.

In addition, FortiSandbox features tighter integrations with an array of established Fortinet security products, including FortiMail, which is now able to hold messages for sandbox inspection and then subsequently act on the results.  This enhancement complements numerous existing integrations between FortiSandbox, FortiGate and other Fortinet products.

FortiGuard Labs: Powering Advanced Threat Protection
In light of an increasingly complex and diverse threat landscape, customers are rapidly incorporating Advanced Threat Protection technologies into their network security infrastructure. This trend is underscored by accelerating adoption of Fortinet’s sandboxing solutions, which has now surpassed the 3,000 customer mark globally.

FortiGuard Labs delivers and powers key Advanced Threat Protection framework components, including adaptive defence tools like FortiSandbox that protect against multi-vector zero-day attacks. Fortinet’s security research division constantly monitors the evolving threat landscape, specialising in a wide range of research areas that include covert surveillance of malware and botnets, reverse engineering of malware, signature generation, and zero-day attack analysis.

Threat Intelligence powered by FortiGuard Labs was instrumental in FortiSandbox earning a “Recommended” rating by independent testing firm NSS Labs in the 2014 Breach Detection Systems comparative analysis. During this test, FortiSandbox had an overall breach detection rate of 99 percent.

The FortiSandbox Advantage
Featuring a unique dual-level sandbox, inspection of all protocols and functions in one appliance, as well as optional FortiGate and FortiMail integration, FortiSandbox delivers highly effective protection against highly targeted attacks and other threats in a solution that also touts affordability and ease of use. Rich threat intelligence, actionable insight and the ability to share information with FortiGuard Labs combine to help enterprises reduce the risk of compromise and breach.

The New FortiMail
The latest release of FortiMail delivers significantly advanced email security, not only with the deeper FortiSandbox integration but also a new behavioral detection engine, newsletter category and more.

Availability
The virtual, cloud and on-premise versions of FortiSandbox, as well as the latest update to FortiMail, are currently available. For more information about FortiSandbox, please visit: http://www.fortinet.com/products/fortisandbox/

The post Fortinet Delivers Flexible Advanced Threat Protection and Security Integration with New Virtual FortiSandbox appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Fortinet Delivers Flexible Advanced Threat Protection and Security Integration with New Virtual FortiSandbox

  

UL receives confirmation from Visa for simulating the latest version of ADVT

Posted on: October 30th, 2014 by

By ASM

UL Logo

UL is pleased to announce that its Collis Brand Test Tool has been confirmed by Visa for the simulation of Visa Acquirer Device Validation Toolkit card images.

The new release of the Collis Brand Test Tool supports the latest Visa Acquirer Device Validation Toolkit (ADVT) 6.1 (consisting of a set of test cards and test scenarios), designed to ensure that ATMs and POS devices are configured in accordance with Visa requirements. Acquirers are required to successfully complete testing with the ADVT prior to introducing new chip readers or changing configurations or payment software.

The Collis Brand Test Tool is the all-in-one brand certification tool for the major payment brands. In general, the Collis Brand Test Tool has the ability to simulate any test card, both contact and contactless. Using card simulation takes away the need for physical cards that can get corrupted or lost. The Collis Brand Test Tool provides clear user guidance and it is fully aligned with the test specifications of the seven major worldwide payment schemes. It also provides full insight in the technical details of the communication between the card and the terminal on the one side and between the terminal and the network on the other side. This allows a tester to gain detailed insight in the behavior of the system from end-to-end.

“UL continues to provide high quality test tools for the payment market. We are confident that our customers will benefit from this confirmation as it will help them  reduce the time to market, ease their device testing, and increase their confidence during the Visa implementation,” adds Maxim Dyachenko, Manager Service Line Test Tools at UL’s Transaction Security division.

The Collis portfolio of test tools is developed by UL. For further information, please visit www.ul- ts.com

The post UL receives confirmation from Visa for simulating the latest version of ADVT appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: UL receives confirmation from Visa for simulating the latest version of ADVT

  

Check Point extends public cloud security by being Microsoft Azure Certified

Posted on: October 30th, 2014 by

By ASM

CheckPoint Logo

Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, has announced the extension of its security offerings for public cloud services, bringing the company’s security gateways software to the Microsoft Azure Marketplace.

The growth of cloud IT infrastructure (Infrastructure as a Service) brings a multitude of benefits to organisations, including cost savings, elastic compute resources, less time necessary in managing IT environments and more time growing the business. While it may be easier and cheaper to manage IT resources in the cloud, it is equally as important to secure both the on premise and cloud-based infrastructure.

“Cloud computing creates tremendous opportunities for organisations to grow in a flexible and cost-effective way. As such, Check Point strongly believes in enabling this trend by offering security and access controls to protect both on premise and cloud assets,” said Dorit Dor, vice president of product at Check Point Software Technologies. “We’re delighted to be Microsoft Azure Certified to help our joint customers manage all of their security needs, safeguarding corporate assets across the organisation.”

Key features include:

    • Extension of security to the cloud: Check Point’s Threat Prevention security solution can be deployed in Microsoft Azure, offering the protections needed based on an organisation’s public cloud deployment. This allows organisations to deploy a public cloud or a hybrid environment with confidence.
    • Quick and easy to enable: Customers can easily deploy the full range of Check Point’s software blade architecture through Azure Marketplace. The Check Point Virtual Security Gateway for Azure supports Firewall, IPS, Application Control, and Anti-Bot Software Blades in Azure protecting the infrastructure from unauthorised access and attacks.
    • Easily manage hybrid environments: Organisations can manage their on-premises Check Point enterprise solutions through Check Point’s security management. Whether the solution is physical, in the private cloud, or in the public cloud, the same network policies can be applied to the virtual gateway. Additionally, logs and events from the Check Point Virtual Gateway for Azure can be centrally stored on Check Point’s enterprise management solutions.

“Solution providers like Check Point are pivotal in the cloud transformation,” said Garth Fort, General Manager of Enterprise Partners, Microsoft. “As new cloud scenarios emerge, companies like Check Point are harnessing the power of Azure and the multiple could scenarios it supports to provide their customers with innovative options that protect both on-premises and cloud-based infrastructure.”

Azure provides a consistent platform across private, hosted and public clouds. For more information about the Microsoft Azure Certified program or available solutions in the Azure Marketplace, see: http://azure.microsoft.com/marketplace.

To learn more about the new Check Point Virtual Appliance for Azure, visit: www.checkpoint.com/products/virtual-appliance-microsoft-azure.

Availability
Check Point’s security gateways will be available for sale on the Azure Marketplace in one of two models: pay-as-you-go or bring-your-own-license. Check Point Virtual Appliance for Azure is also available from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator

The post Check Point extends public cloud security by being Microsoft Azure Certified appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Check Point extends public cloud security by being Microsoft Azure Certified

  

Examining adult-onset offending: A case for adult cautioning

Posted on: October 30th, 2014 by

The paper examines the nature of adult-onset offending and explores whether adult cautioning may be a suitable and cost-effective alternative to current court processing.

The authors argue that extending formal police cautioning to include first-time, less serious adult-onset offenders is a cost-effective strategy that would enable scarce criminal justice resources to be redirected to provide evidence-based interventions for more serious and prolific offenders who present an ongoing risk of offending.

…read more

Source: Examining adult-onset offending: A case for adult cautioning

  

Introducing the Check Point Capsule: Groundbreaking mobile security that goes where you go

Posted on: October 29th, 2014 by

By ASM

CheckPoint Logo

Check Point® Software Technologies Ltd. , the worldwide leader in securing the Internet, has announced the availability of Check Point Capsule, a complete mobile solution that offers unparalleled protection for business data and mobile devices, everywhere.

In Check Point’s 2014 Mobile Security Survey, which surveyed over 700 IT professionals around the world including 100 IT professionals from Australia and New Zealand, over half of the respondents managed business data on employee-owned devices. Nearly all (98%) respondents expressed concern about the impact of a mobile security incident on their organisations, and 82% of the security professionals surveyed expected mobile security incidents to rise in 2015.

The massive surge in mobile device usage within businesses continues to challenge IT and security teams, as they face the increased complexity of mobile security management and are at greater risk for data loss incidents. Check Point Capsule addresses these challenges by offering a complete mobile solution that ensures seamless security regardless of where the data or device goes.

“The Check Point Capsule is an exceptional extension of our industry-leading enterprise security solutions. Protection of information, regardless of device or location, is a clear necessity for all organisations and we are excited to offer a multi-layer mobile solution that is both seamless and secure,” said Kurt Hansen, managing director for Australia and New Zealand at Check Point Software Technologies. “With Check Point Capsule, an organisation has unmatched security that goes on any device and on any document, everywhere.”

The Check Point Capsule is a single solution that offers multi-layer security which includes:

Secure access to work: Protect business data on mobile devices, without having to manage the entire device. The Check Point Capsule creates a secure business environment and separates business data from personal data and applications on mobile devices. This enables users to securely use business applications through a simple user interface, where users have one touch access to corporate email, files, directories, corporate contacts, and calendars, without affecting their personal data.

Safe business documents: Prevent internal and external data leakages by attaching security that travels with the document. The Check Point Capsule secures business documents everywhere; authorised users can access a protected document seamlessly and transparently on any device.

Protection from threats everywhere: Extend the corporate security policy to protect devices from threats when outside of the corporate network. The Check Point Capsule scans all traffic from mobile devices in the cloud and prevents access to malicious files and websites, bot damages, and other cyber threats. This cutting-edge security supports various device platforms and operating systems including iOS, Android, Windows and MacOS.

“Organisations are increasingly reliant on mobile devices for BYOD and business process improvement, but mobile security continues to lag behind. Point tools provide some help for IT operations but they don’t provide a true enterprise-class mobile security solution. Check Point Capsule is a refreshing alternative that may actually bridge the enterprise mobile security gap,” said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. “Check Point Capsule is one of few mobile security products that provides threat prevention, document-level data security controls, and granular access controls that can mitigate security risks while enabling mobile business processes.”

“The Check Point Capsule is an innovative next-generation mobile security solution that offers the necessary protection based on an organisation’s mobile needs. The use of mobile devices on corporate networks will only continue to rise, and Check Point Capsule is an exciting extension of Check Point’s industry-leading enterprise security for the increasingly mobile workforce,” concluded Hansen.

For more information about the Check Point Capsule, visit: http://www.checkpoint.com/capsule/.

Availability

The Check Point Capsule is available immediately from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/

The post Introducing the Check Point Capsule: Groundbreaking mobile security that goes where you go appeared first on Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News.

…read more

Source: Introducing the Check Point Capsule: Groundbreaking mobile security that goes where you go