CFOtech Australia - Technology news for CFOs & financial decision-makers

Access Control stories - Page 37

Gettyimages 952777456

Three ways to protect your business in the cloud

Fri, 24th Apr 2020
#
firewalls
#
network security
#
mfa
A modern BYO-anything workforce means more access points, hidden apps and hurdles to secure across the organisation.
Gettyimages 944915068

Genetec shows impressive growth, says IHS Markit

Tue, 6th Aug 2019
#
firewalls
#
data analytics
#
network security
IHS has named Genetec one of the fastest-growing access control software manufacturers in the world, according to the latest IHS Report.
Gettyimages 1068618692

CyberArk introduces new partner incentives and programmes

Fri, 19th Jul 2019
#
firewalls
#
network security
#
partner programmes
CyberArk has launched new programmes and incentives to empower partners and boost business for its privileged access security solutions.
Cybersecurity14

Genetec announces new line of hybrid access control and intrusion hardware

Wed, 10th Jul 2019
#
firewalls
#
network security
#
physical security
Synergis IX provides a gateway to unified security, enabling customers to manage their security systems on a single interface.
Identity and access management7

Cloud-based ID card issuance will reinvent government processes

Thu, 6th Jun 2019
#
firewalls
#
network security
#
physical security
HID Global meets the most demanding requirements for security, quality, and effective program execution in today's most complex ID programs.
Zebra

ANZ market to benefit from HID Global's new access control solution

Thu, 13th Sep 2018
#
firewalls
#
network security
#
physical security
SMBs are 4x more likely to be victims of crime than homes are, a statistic HID Global is looking to tackle with its latest security solution.
Security padlock

Aquion signs on as first local Unisys Stealth value added reseller

Mon, 13th Feb 2017
#
virtualisation
#
firewalls
#
data protection
Aquion becomes ANZ's inaugural reseller of Unisys Stealth, offering top-notch cyber protection for enterprises and governments.
30

Who's listening?

Thu, 1st Jul 2010
#
uc
#
firewalls
#
vpns
Security requirements and strategies apply to unifi ed communications solutions just as much as they do to traditional phone and email systems.