Pradeo Security Systems vient d’annoncer la création de sa filiale au Royaume-Uni et souhaite se développer rapidement sur ce marché, d’où sa présence à Infosecurity Europe en partenariat avec Business France. Cette étape s’intègre plus largement dans une volonté de conquête rapide des marchés au niveau mondial. Vincent Roux-Trescases, VP Executive EMEA, et Dejan Draguljevic, Directeur des ventes France & UK, Pradeo Security Systems, nous expliquent les grandes lignes de leur stratégie de (...)
Accueil > Mots-clés > afficher un article sur la home > affiche
affiche
Articles
-
Vincent Roux-Trescases et Dejan Draguljevic, Pradeo Security Systems : nous sommes désormais implantés au Royaume-Uni
5 juin 2015, par Emmanuelle Lamandé -
Goodbye plastic, hello titanium: why metal bank cards are the future of finance
24 August 2021, by Vince Graziani, CEO, IDEX Biometrics ASAWhen Apple launched its credit card product in 2019, there was much buzz about its minimalist metal card. Made of titanium and weighing in at almost 15 grams, it was rapidly seen as the must-have status symbol for those with an enviable credit rating. But what was less discussed with the launch of the Apple credit card was what it meant for the future of payments in an era when digital payment services are starting to gain traction.
For the credit product, Apple had still chosen to launch (...) -
G DATA: Hotel safes - are they really safe?
17 July 2014, by G DATAThis is the beginning of the holidays; a lot of people will travel during the next weeks and may stay in a hotel. The rooms are usually equipped with a safe to store valuables such as money, passports or your laptop. Experts of the G DATA SecurityLabs checked the security level of one safe which is made in China and is sold under many different brands. We expose the findings in this article.
Presentation of the safe
The safe is a mid-size standard hotel room safe, made out of steel, (...) -
Philippe Rondel, Check Point : nos nouvelles appliances offrent la performance et la sécurité
4 août 2011, par Marc JacobCheck Point vient de sortir deux appliances de sécurité très haut débit et a fait une mise à jour de R75, sa suite de sécurité, basée sur sa technologie Blade Avec ces solutions, elle souhaite adresser le marché des Data Centers. La société espère conquérir les hébergeurs et les opérateurs Télécoms qui ont besoin de performances en termes de débits et de sécurité. Philippe Rondel, responsable technique de Check Point analyse sa stratégie.
GS Mag : Vous venez d’annoncer le lancement des appliances (...) -
Cybersecurity Starts with Training Your Employees
11 July 2017, by Mohammed Basheer, IT Security Practice Head, ISYX TechnologiesThe Petya ransomware attack that hit computers around the world recently, the second in two months, is yet another reminder that computers play key roles in most enterprises, and that it does not take much to disable those computers. Irrespective of how robust your information security systems are, users are still the weakest link in your company’s cybersecurity.
It’s a business cliché that staff are a company’s greatest asset and potentially its greatest risk. And while that has always been (...) -
Data Protection Day 2020: De-Risking in the Era of Transparency
22 January 2020, by Daniel Fried, General Manager (GM) and Senior Vice President (SVP), EMEA and Worldwide Channels, VeeamThe issue of data protection and privacy was, until recently, a conversation confined to a specific group of people within an organisation. Unless you were an IT consultant or a corporate lawyer, privacy compliance was something somebody else took care of. So, how have we reached the point where many organizations are bound by law to employ a Data Protection Officer (DPO)? Why are CEOs now so interested in their company’s data protection and privacy policies?
You could be easily fooled into (...) -
L’étude stratégique : une étape essentielle pour crédibiliser et fiabiliser un projet d’implantation de datacenter de proximité
7 mai 2019, par Anne-Laure GREMAUD Direction Marketing - Communication & Associée, JerlaureLes investissements THD réalisés sur tout le territoire, la montée en puissance des services Cloud nécessitant toujours plus d’espace de stockage et l’explosion des objets connectés exigeant un traitement de la donnée en temps réel, ont mis le Edge Datacenter, levier incontestable de la transition numérique, au cœur de tous les projets de développement du territoire.
SE LANCER SUR LE MARCHE DU EDGE DATACENTER…
Les Edge Datacenters, aussi connus sous le nom de Datacenters de Proximité ou encore (...) -
Four Hidden Costs and Cybersecurity Risks of sudo
2 July 2018, by Morey Haber, chief technology officer, BeyondTrustIt is always a philosophical debate as to whether to use open source software in a regulated environment. In the case of ‘sudo’—a package designed to provide privileged access included in many Linux distributions—the debate is whether it meets the requirements of an organization, and to what level it can be relied upon to deliver compliance information to auditors. While every organization is different, there are four specific risks/costs that you should consider before deciding if sudo is (...)
-
Laurent Pelud, CEO de Scassi Group : Avec Auditool Auditez bien, gagnez du temps, et soyez conformes !
4 juin 2020, par Marc JacobScassi Group vient de sortir une solution d’audit de sécurité appelée AUDITOOL. Elle cible les auditeurs en leurs proposant un outillage web et nomade professionnel pour réaliser des missions en intégrant tout le processus de contrôle : préparation, audit et rédaction du rapport. Laurent Pelud, CEO de Scassi Group considère qu’AUDITOOL va permettre de bien auditer en gagnant du temps, tout en restant conformes !
GS Mag : Vous sortez votre nouvelle solution d’audit Comment fonctionne-t-elle ? (...) -
SCADA Security Basics: Why Industrial Networks are Different than IT Networks
31 October 2012, by Heather MacKenziePreviously we looked at the question of “Why are PLCs so insecure?” Today we are going to come at SCADA security from another angle, which is “Why is securing Industrial Networks different than securing IT Networks?” We will also look at three ways to address these differences.
Recently I attended the Belden Industrial Ethernet Infrastructure Design Seminar and participated in an excellent session by Mark Cooksley, product manager for network management in Belden’s Hirschmann group, called (...)