COMPUTING SECURITY AWARDS
|

|
COMPUTING SECURITY AWARDS
The results from the 2015 Computing Security Awards were revealed at a ceremony in London in October. Former England Cricket Captain Chris Cowdrey was Master of Ceremonies for the evening. Comedian Josh Daniels and Event Manager Dave Bonner assisted Chris by presenting the trophies. Here are the first of our winners.
|
Content Security Solution of the Year
WINNER: FuseMail provides a comprehensive suite of cloud-based email security solutions
RUNNER-UP: GFI Software - GFI WebMonitor
All of the 2015 Awards results can be seen by going to:
www.computingsecurityawards.co.uk
Please note: the winning products and services will not necessarily be the only solutions or the newest solutions available from the respective suppliers. You should contact these suppliers directly to learn more about what they can offer.

|
 |
Frictionless Security
'Adam Boone, chief marketing officer at Certes Networks, sets out three principles for protecting applications in the modern enterprise
|
 |
Lepide Auditor Suite 15.2
Change auditing is essential for enterprises, helping them to comply with ever tougher data protection regulation
|
 |
Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot
|
 |
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these
|
|
|
|
|
Welcome to the November 2015 Newsletter.
Readers will no doubt have seen how the European Court of Justice struck down the Safe Harbor agreement that many companies have been relying on to allow data transfers between the US and Europe. This decision could have serious repercussions for any country doing cross-Atlantic business.
It’s an action that has caused some anxiety in the industry and provoked this reaction from Rimon Law's John Isaza, an internationally recognised attorney in the emerging legal fields of information governance, and records and information management (RIM). “The Safe Harbor agreement was designed to allow companies to move personally identifiable digital information such as people’s web search histories and social media updates between the European Union and the United States,” he points out.
“Many companies had been relying on this international agreement to allow data transfer between the US and Europe. Quite candidly, very few had actually gone through the Safe Harbor certification process under the agreement. In any event, companies need to ensure that the data remains in servers within at least one of the 28 EU countries, to the extent possible. Companies that rely on the transfer of data to function, such as Google and Facebook, are in legal limbo.”
Adds David Evans, director of policy at BCS, The Chartered Institute for IT: “In order to support a sustainable digital society, putting individuals back into control of their data, so they have real choices and those choices are respected, is absolutely vital. So this ruling is one of many reasons we need to re-imagine how personal data is managed.”
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|