Your are here:hacking technology > firewall > Article list

Home > firewall > Page 2
How you spend your Payment Card Industry AuditHits:3
forward for organizations that store or process credit card information, is of crucial importance, since they must be able to demonstrate compliance with the Payment Card Industry Data Security Standards (PCI DSS). PCI DSS attempts...08/30/2010
Quantix partners want to offer two-factor authentication in a cloud environmentHits:4
Quantix has been associated with means for all customers with two-factor authentication (2FA) in their environment cloud. By offering hosted 2FA means service as standard, Quantix able to mitigate the security concerns and a scalable cloud...08/27/2010
Cyber-crime industry is automated to improve the efficiency, scalability and efficiencyHits:7
The world of hackers has developed two main varieties: Attacks and advanced Industriel?Change sustained Gef?hrdung (APT). There was much discussion of the validity of the APT recently - some have been connected even their pants with APT....08/26/2010
OnSSI provide Texas in the United Superm?MarketsHits:14
A network of video cameras running on NetDVMS Video Networking Software Gesch?fts of the recorder software and OnSSI mobiDEOS MobileCamViewer of eternal candle to 28 Lebensmittelgesch?fte that chain supermarkets...08/25/2010
LogRhythm makes patterns and exceptions, which makes otherwise have remained unnoticed LogRhythm patHits:4
To identify companies and mitigate threats from within and au?outside the firewall takes care of today LogRhythm system processes and network connections to endpoints offers Geolocation of hosts, and the relations of maps on the display of...08/24/2010
IT network defender is not the eyes off the ball w?During the World CupHits:3
A recent survey of Tufino technologies are implemented, IT professionals no geeks in a dusty back room to speak their own language, but is m?glicherweise knight in gl?Complementary waiting arms battle. The study among 241 professionals...08/23/2010
Imperva Data Security Suite helps companies not only to protect web applications and databases, fileHits:2
According to research firm IDC, 80 percent of all gesch?ftlichen data is the data that will grow to 60 percent. At the same time require the mandates of many governments and businesses to monitor the private sector and to control access to...08/20/2010
ETips Avenda Brescia University?t L deploys security policy?solution for authentication and authorizHits:8
Brescia is a Catholic university?t, liberal arts institution in Owensboro, Kentucky, founded in 1950 by the Ursuline Sisters of Mount St. Joseph. Avenda Systems has announced that the University?t of Brescia has its security policy...08/19/2010
EcoSense NVR offers Plug &Play-IP connection from the camera and recording for network installers wiHits:11
NVR new Dedicated Micros'EcoSense (Network Video Recorder) is designed?ed to make the connection plug and play IP cameras and recording for installers without prior knowledge of the IP network. It also integrates an hour?heren Layer 2 ...08/18/2010
The security issues with cloud computing in the?public sector assignedHits:3
The adoption of Cloud Computing caused significant concerns about the Privacy?re and safety?public sector. Benefits Cloud Computingsind very convincing, especially since the government to the private sector cloudy withhrte techniques...08/17/2010
Mykonos security apparatus IT security stops attacks before the matter?or isHits:8
Early detection of an attack is important because it completed a significant time-division safety and saves money cheaper, because the attack is never, and does not answer. Mykonos Software have announced a new version of its...08/16/2010
1 of 10 IT professionals admit Betrugwagen, an examination of the past get ITHits:1
According to a survey conducted by technology Tufino of 242 IT professionals from organizations that are used primarily from 1000 to 5000 + employees, one in 10 that she cheated to pass or a colleague an IT Audit permit. W?During our...08/13/2010
The security check off the shelf business applications, riddled with errors and vulnerabilities in tHits:2
According to a survey carried out by Fortify Software, 83% of IT security experts believe commercial applications to buy them off the shelf, full of errors and vulnerabilities in the code. 56% believe that this M?ngel k?nnten allow hackers...08/12/2010
Juniper Networks assumes SMobile a secure mobile Internet experience on any mobile device?t intelligHits:7
Juniper Networks has announced the takeover of SMobile, a provider of security smartphone. The Columbus-based Ohio SMobile Systems, Inc., is a company?ed private software exclusively?lich on smart phones and...08/11/2010
Check Point Software announces its financial results for the second quarterHits:5
Check Point Software Technologies Ltd. has its financial results for the second quarter ended 30 Announced in June 2010. Gross Sales: 261,100,000, an increase of 17% compared to one?or previous Revenue: 103,900,000, an increase of 25% c...08/10/2010
Best Practices for the cleaning of a firewall or router rule baseHits:5
Over time, tend to the basics of firewall rules too large?and are complicated. They often include rules that are wholly or partially unused, expired or is in the shade. The problem worsens when there are multiple administrators to?make...08/06/2010
More than 2,500 attacks on Web pages per hourHits:3
Jason Hart, CEO of cryptographic card, has indicated that the number of attacks on sites reached 2500 per hour. Jason Hart made the remarks w?During the conference organized by E-breakfast Challinor fraud Midlands law firm. There is an...08/05/2010
Ontrack Eraser permanently erases critical business informationHits:12
Kroll Ontrack has developed the Eraser software, which permanently erases all data following implementation. Ontrack Eraser helps companies protect against potential security breaches and comply with data retention and privacy laws -...08/06/2009
Bringing Security into a Positive LightHits:6
Information security managers have always had a healthy fear of the unknown threat. But over the last two years that fear has developed into a paranoia, an obsession that keeps them up at night sweating over thoughts of malware that may be...08/06/2009
Arbor Peakflow X provides Commercial Bank of Dubai with internal network security, traffic monitorinHits:6
Arbor Networks has announced that the Commercial Bank of Dubai has deployed the Arbor's Peakflow X platform to provide internal network security, network-wide traffic monitoring and compliance. Peakflow X is used for three main purposes:...08/04/2009
Seeing through the VoIP security hypeHits:8
There s a lot of debate around the security of converged communications at the moment; discussions of new and existing threats bringing down the business critical voice network when it hits the converged network on which everything rides...08/04/2009
Free software to combat software piracy and improve the cyber security of Russian PCsHits:10
Comodo and ICOS UNESCO IFAP in collaboration with the LinuxCenter has announced the distribution of a new collection of software launched through a joint project called the Free Software for Education, Science and Culture . The...07/30/2009
Eurotech releases industrial GSMG PRS 3G wireless routerHits:28
Targeted for telemetry, Internet access and mobile computing applications, the rugged ZyWAN offers a secure connection across GSM/GPRS/3G, CDMA mobile data networks. It provides real-time access to any Ethernet, 802.11b/g or serial...07/30/2009
Bluewin Security protects Swisscom customers from malware and hackersHits:13
Swisscom customers can fully enjoy the benefits of their Internet experience without worrying about malware or hacking by subscribing to Bluewin Security. The security package contains a comprehensive set of security features. In...07/23/2009
Network Box provides firewall and unified threat management solution to East London Bus GroupHits:13
East London Bus Group (ELBG) has selected managed security company, Network Box, to provide a high availability firewall and unified threat management solution for its corporate network. ELBG has 4350 employees working at 13 locations in...07/23/2009

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:2 , Total 13 Pages, Every Page 25 Records, Total Records: 322

Hot Articles
Recommend Articles
New Articles
Sub category