The software analyses security information to enable businesses to better pre-empt and deal with security threats.
Technology has been abused in a bid to steal about R160 million from government.
The vendor uses behavioural detection techniques to identify malicious P2P communication attempts from malware.
As long as there is digital technology and money, cyber criminals will attempt to use one to get their hands on the other, says Simon Campbell-Young, CEO of Phoenix Distribution.
The detection, identification and mitigation of network threats will be boosted by HP's NGIPS portfolio.
The agency will outline its full-blown security initiative in reaction to a security breach of the police's official Web site last week.
Thousands of whistle-blowers have had their personal information made public, following a breach in the police's IT security.
Microsoft's Digital Crime Unit aims to protect businesses and individuals against cyber crime by understanding how adversaries operate.
The malware propagates itself on a system, forcing victims to part ways with their information and/or money, says Cyberoam.
Lack of management approval, lack of training and support, and cost prevent businesses from adopting security development processes, says Microsoft.
Conformity to ISO 27034-1 means software developed using Microsoft's Security Development Lifecycle is more secure and less vulnerable to exploits.
The two-day event will teach delegates about proven security development practices through keynotes, sessions and interactions with peers.