Ian Barker

Jitterbit connects SAP to the cloud

Enterprise cloud

SAP is the world's most popular ERP (enterprise resource planning) system, but a recent survey by HCL Technologies shows that integration with their existing solutions was the biggest obstacle to 45 percent of SAP users when implementing cloud technologies.

Integration company Jitterbit has announced a new SAP Connector that lets businesses integrate their existing processes with SAP whether they're on-site or in the cloud. Certified by SAP and running on Jitterbit's Harmony cloud platform it offers faster integration and is compatible with SAP's latest HANA in memory appliance.

Continue reading

Internet of Things devices open up new avenues for hackers

Attack route

We're constantly being told that the internet of things is set to revolutionize the world we live in. Gartner has predicted that it will have around 26 billion units by 2020, but with this rapid growth comes added risk.

A new study from HP shows that 70 percent of the most commonly used internet of things (IoT) devices contain vulnerabilities, these include password security, encryption and personal data issues.

Continue reading

Cleaning up after viruses -- which antivirus solutions are best?

Virus detection

In an ideal world there wouldn't be any viruses at all but, since there are, the next best scenario is to have an antivirus program to protect you. But what happens once it's too late? If you get a virus infection how good are antivirus and clean up tools at repairing your system?

Independent testing organization AV-TEST set out to resolve this question with a comprehensive 10-month test using 17 different software packages.

Continue reading

Millions of Android devices could be at risk from Fake ID flaw

AndroidFakeID_icon-300x300

A newly uncovered flaw in Google's Android OS could leave large numbers of mobile devices at risk from malicious apps that appear to be from trusted developers.

Named 'Fake ID' by Bluebox Security who uncovered it and notified Google of its presence, the vulnerability lets malicious applications impersonate specially recognized trusted applications without any user notification. Although a patch was issued in April it's likely that many devices are still at risk.

Continue reading

Post Target many retailers continue to leave data at risk

Credit card theft

More than six months on from the Target breach hitting the headlines retailers are still not properly protecting their data according to risk management specialist BitSight.

Writing on the company's blog CTO and co-founder Stephen Boyer says, "BitSight has continued to observe evidence of system compromise inside hundreds of retailers over the course of the year. Based on our data and analysis, we observed that there were many retailers with poor performance and that this downward trend has continued into the second half of 2014".

Continue reading

Better use of data can avoid the impact of a bad sales experience

Falling sales graph

We've all had bad sales experiences at some time or another and they inevitably have a negative impact on our view on the company concerned.

A new study by mobile sales enablement specialist Showpad reveals that it can take years to recover from the damage caused to the customer relationship by a bad sales experience.

Continue reading

InPowered helps marketers use the power of expert opinion

anexpert

Independent reviews and opinions are a valuable commodity for marketers as they can often be key to purchasing decisions. Now content management specialist InPowered is launching a new product to help companies find out what experts are saying about them.

Called Expert Ranking it identifies the top experts on any topic and allows brands to discover what these experts are writing about them. It then lets the brand promote those opinions via their web, social and mobile channels.

Continue reading

One in four IT professionals aren't aware of virtual security options

Security alert

Securing IT is essential for any modern business, but according to a new study carried out for security company Kaspersky Lab around one in four IT security experts have little or no understanding of the security options for virtual environments.

Almost half of respondents (46 percent) said that virtual environments can be adequately protected by conventional security solutions and 36 percent believe that security concerns in virtual infrastructures are significantly lower than in physical environments.

Continue reading

Fake Googlebots used to drive DDoS and other attacks

botnet

Googlebots are essential to the smooth running of the search engine, ceaselessly probing websites to ensure that Google stays up to date with the latest developments and site changes.

But for every 25 genuine Googlebots that visit your site you'll also be visited by a fake Googlebot -- more than 23 percent of which are used for DDoS attacks, hacking, scraping and spamming. This is among the findings of security company Incapsula's 2014 Search Engine Study.

Continue reading

Technology helps college kids communicate and learn

Photo: Petrenko Andriy/Shutterstock

Going away to college is a milestone for both parents and their offspring and technology giant Dell has released the results of a survey showing how families buy technology for this key time.

The survey was conducted among more than 1,000 respondents across the US, split evenly between students of 16-19 planning to attend a two to four year college course, and parents.

Continue reading

Zettaset offers simpler big data security for the enterprise

Big data

Companies are increasingly keen to take advantage of the insights that big data can offer. But this does lead to problems with controlling access and keeping the data secure in a way that works with existing systems.

Big data security specialist Zettaset is now making its Orchestrator product available as a standalone offering. This will allow customers to take the whole offering or individual applications as required to customize and secure their environment.

Continue reading

Virtual smart card solution offers improved security at an affordable price

security

Traditional authentication methods like passwords are vulnerable to data breaches as well as being difficult to remember and manage. But although tokens and physical smart cards provide better protection they're expensive to implement and maintain.

Security company Wave Systems Corp has a new virtual smart card solution that emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, lower total cost of ownership, and a reduced risk of unauthorized use.

Continue reading

The tracks of my bargains – sacrificing privacy for a good deal

retail store shop camera surveillance

The increased popularity of smartphones means that, unless we specifically opt not to, most of us leave a record of our location wherever we go.

This information is of course valuable to marketers and a new study by customer engagement specialists PunchTab reveals that consumers are concerned about how location data is used.

Continue reading

Self-destructing content service ensures shared data stays private

Self-destruct button

When you send a file to someone else there’s always a risk that it could be copied or forwarded, even if it's intended to remain private -- as many a snapper of naked selfies has found to their cost.

There have been attempts to solve this problem in the past of course with services like Snapchat and Yahoo's Blink, that allow content to be viewed for only a short time, but none of these are aimed at business users.

Continue reading

Comodo SecureBox always assumes the worst to strengthen endpoint security

padlock box secure

Cybercriminals are constantly targeting end users via phishing and social engineering attacks in attempts to access sensitive information or corporate data and bypass traditional endpoint security. Often these attacks are delivered from devices outside the enterprise, belonging to customers or suppliers for example.

Internet security specialist Comodo is launching a new product aimed at plugging the security gap and guarding against, keylogging, SSL sniffing, remote screen viewing, memory scraping, man-in-the-middle attacks, zero-day malware and more.

Continue reading

Ian's Latest Tweets

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.