EdgeWave has added iPrism Social Media Security, a service designed to monitor and control social media interactions, to iPrism Web Security 7.1.
The University of Maryland Institute for Advanced Computer Studies has put in place a program that monitors computers for changes to attributes in order to detect possible security breaches.
The College of Dental Medicine at Georgia Health Sciences University is home to a new virtual private network (VPN) created specifically to help universities and private researchers share data related to patent-pending antimicrobial technology.
Greenville Technical College had traditionally funded its central IT infrastructure projects through the school's internal budget. Databases, servers, firewalls, and wireless technologies were all taken care of out of pocket. That changed in 2010 when the need arose for a more robust wireless setup to replace an existing WiFi hotspot system that was reserved only for common areas.
An emphasis on the open sharing of ideas makes higher ed more vulnerable to network attacks than corporations. How can schools mitigate the risks while still preserving their academic freedom?
SCL Elements and Tridium, the developer of the Niagara Framework software platform for managing diverse building systems, have teamed up to add support for EnOcean and ZigBee wireless communication protocols in Niagara-based systems.
Procera Networks has released a new version of its intelligent policy enforcement (IPE) solution, PacketLogic SmartCampus 2.0.
Thirty-two percent of IT professionals say that data loss is their top concern, according to CDW Government's (CDW-G) "2012 Data Loss Straw Poll."
The IT team at Western Kentucky University manages 40,000 ports on 700 switches across five campuses. Network Services Manager Jeppie Sumpter said it was a "fairly manual process" until a couple years ago. Dian Schaffhauser explains how the team automated most of that process.
A company that addresses mobile security has released a free security app and location tool that lets the user track down the whereabouts of his or her smartphone and wipe data remotely from its memory.