2016 total news stories found.
2010-03-18 | Dallas based CyberlinkASP demonstrates strong growth and stability during difficult economy
2010-03-17 | LocalITCompanies.com with offices in Chicago, Dallas and Houston has now expanded their services nationwide. Local IT Companies connects businesses with up to three pre-screened IT consulting companies, allowing the business to choose its ideal match.
2010-03-16 | Vendor Safe Technologies' New LAN Scribe Logging Client Simplifies PCI Compliance for Credit Card Merchants, Delivers Real-Time Security Notifications When Critical Files Are Accessed
2010-03-16 | With a cumulative market valued at $65.5 billion (2013 - 2018), the U.S. Federal Cybersecurity market will grow steadily - at about 6.2% CAGR in 2013-2018.
2010-03-05 | The U.S. Government Deep Packet Inspection market has been bolstered in the recent years by deployment of Einstein, an intrusion detection system that monitors the government networks.
2010-02-28 | Visiongain calculates that the global cyberwarfare market was worth a total of $8.12bn in 2009. Visiongain expects to continue to see significant sales growth.
2010-02-28 | NOXEL launched today the NXR240B. The NXR240B combines a power-efficient RFID reader with built-in directional antenna; a low power Bluetooth interface and a built-in battery for 10 hours effective operation into a light, small form-factor unit.
2010-02-24 | Retired FBI Special Agent in Charge Michael Tabman discusses the importance of crisis prevention planning, identifying risks and taking proactive measures before a crisis emerges.
2010-02-24 | RESERVOIR's development of open architecture and interfaces and open source software are available as downloadable specifications and tools encompassed under "the RESERVOIR Framework" which presents a blueprint to help businesses build on-demand infrastructure services.
2010-02-23 | Market Research Media has announced the addition of the new report "Deep Packet Inspection (DPI): U.S. Government Market Forecast 2013-2018".
2010-02-20 | With the poor economy still lingering, many people are less inclined to purchase items that they might be able to obtain for free, even if it means spending time searching for these items. Computer software is at the forefront of this rising trend.
2010-02-19 | New Massachusetts Data Privacy Act Goes into effect March 1, 2010
2010-02-14 | Co-founder and two-time past president of The Tampa Bay Technology Leadership Association (TBTLA) elected for a third term
2010-02-11 | Registration is now open for the 11th Annual Innovative Technologies for Corrections Conference, hosted by the National Law Enforcement and Corrections Technology Center (NLECTC) June 21-23, 2010 at the Westin Beach Resort, Fort Lauderdale, FL.
2010-02-10 | Ritech International B.V a leading provider of Biometric encrypted solutions assigns Orange Corp Netherlands B.V as their Master distributor in Europe offering their solutions to the corporate, reseller, System integrator, retail and O.E.M markets.
2010-02-05 | After completing the rigorous TRUSTe certification process and demonstrating its trustworthiness, Troubled Teens Wizard - a directory of residential schools, programs and camps for troubled teens, attains the right to feature the TRUSTe Privacy Seal on its Web site.
2010-02-04 | Disaster recovery planning is critical in order to respond in the event of an unplanned outage (disaster) such as a fire, flood, explosion, hurricane, tornado, earthquake, crime, loss of power, etc. Persson Associates now offers an easy to use, low cost product to start the plan development process.
2010-01-28 | Statistics show that New York City business owners suffer great losses from insurance fraud. Icorp Investigations plans to prove it and help local businesses.
2010-01-24 | Grid-Tools Ltd, the leading vendor in data masking solutions for testing and development, launches version 2.6 of Datamaker
2010-01-22 | TerraHawk's patent pending M.U.S.T. technology is the first ever rapid response mobile surveillance platform that allows users to deploy at changing security and surveillance situations within two minutes.