Your are here:hacking technology > firewall > Article list

Home > firewall > Page 5
Engate Enhances Anti-Spam Global Partner Program to Deliver Incremental Value to Hardware and SoftwaHits:2
Engate Technology Corporation has announced an enhancement to its Anti-Spam Global Partner Program with a specialized OEM program designed for software and hardware vendors ranging anywhere from anti-spam software, gateways and...2009-04-02
Virtualisation: Why existing security measures are no longer enoughHits:2
Although virtualisation is not a new concept its present implementations are changing the face of corporate IT, through the reduction of the number of physical servers, the consolidation of rack space and the cutting of energy costs....2009-04-02
IT managers complacent about VoIP infrastructure security threatsHits:2
A recent survey conducted by NetIQ, examining the use of VoIP today within organisations, has revealed that many IT Managers are turning a blind eye to security threats which could compromise their VoIP infrastructure. The findings come as...2009-04-02
Checklist for a Layered Approach to Laptop SecurityHits:3
Here is a quick checklist of best practices for protecting data on mobile assets: 1. Understand the risks. As organisations open up their networks to their mobile workforce, partners, customers and others, they expose themselves to greater...2009-03-31
40% of US SMBs do not believe their networks are secureHits:2
Despite having anti-virus and anti-spam software as well as a firewall installed, four in 10 small and medium sized companies in the United States still do not believe their networks are completely secure, a new survey shows. In a poll...2009-03-31
Barracuda Spam Firewall blocks phishing attacks targeted at salesforce.com usersHits:2
Barracuda Networks, Inc. has announced that its Barracuda Spam Firewall has implemented specific countermeasures to block the phishing malware attacks targeted at salesforce.com users. These attacks were outlined in a broadcast email...2009-03-28
Bewator introducesHits:3
Bewator has introduced a new range of true security hybrid IP cameras. With 'color', 'day-night' and 'day-night with wide dynamic' models available, plus the ability of compression standard selection between MJPEG and MPEG4...2009-03-28
Comodo Endpoint Security Manager protects enterprise data with default-deny protectionHits:1
Computers are exposed to malicious software if a computer user opens an infected email, or reads from an infected thumb drive or disk. With industry-standard default-allow protection, malicious software such as viruses, keyloggers, Trojans...2009-03-26
Nebulas Solutions maintain Virgin Media firewall and and anti-virus infrastructureHits:3
Company takeovers are always challenging, particularly where large scaleIT systems and processes need to be integrated. NTL s acquisition of Telewest and subsequent creation of Virgin Media was no exception. Virgin Media is the...2009-03-26
Winter of Disc ContentHits:3
November and December 2007 have certainly had a wintry outlook for UK Government departments, and have given much cause for discontent. First, HM Revenue Customs mislaid CDs with 25 million personal records on them. This was swiftly...2009-03-24
Internet Security BasicsHits:2
The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the...2009-03-24
Hackers disrupt electrical grids and blackmail power outageHits:1
A senior CIA analyst has revealed that cyberattacks have been used to disrupt power equipment in several regions outside the U.S. In at least one case, the disruption caused a power outage affecting multiple cities. He added that the CIA...2009-03-21
Web hosting providers underestimate the security threat facing web applicationsHits:3
Despite the highly publicized attacks on websites worldwide, many web hosting customers remain unprotected against the newest forms of attacks as cyber crime tactics evolve. Hundreds of thousands of web site operators many with little...2009-03-21
A complex and sophisticated criminal economy has developed to capitalise on Web vulnerabilitiesHits:1
According to IBM's 2007 X-Force Security report, the sophistication of attacks by criminals on Web browsers worldwide is in dramatic increase. By attacking the browsers of computer users, cybercriminals are now stealing the...2009-03-20
Barracuda Networks Launches First Enterprise-Class Web Application Controller for SMB MarketHits:1
As the June 30, 2008 deadline mandating e-commerce businesses of all sizes be compliant with requirement 6.6 of PCI DSS quickly approaches, many SMB organisations have been left with no choice but to prepare for very expensive and very...2009-03-20
Engate Technology Announces vista computing as Reseller Partner for Network-Level Anti-Spam SecurityHits:1
Engate Technology Corporation has announced a strategic channel partnership with vista computing, a technology consulting firm. Under the agreement, vista computing will market and support Engate s network profiling anti-spam...2009-03-18
XGate provides a secure wireless network straight out of the boxHits:2
Global Security One (GSEC1) has launched a security device which creates a highly secure wireless network, straight out of the box. XGate provides a range of benefits to both home and business users, including identity protection, secure...2009-03-18
StealthWatch Improves Network Availability and Security for University of AdelaideHits:2
Lancope , Inc. has announced that the University of Adelaide is using StealthWatch to gain 100 percent insight into routed network traffic in order to identify anomalies such as worms and interface congestion. The University network is...2009-03-18
dns appointed as Welsh Assembly security partnerHits:1
dns, a key player in the managed security services industry, has announced that it has been appointed as the security partner for the 74m, seven year contract with the Welsh Assembly Public Sector Broadband Aggregation (PSBA) project...2009-03-18
Cybercrime is now the domain of organised gangsHits:1
The past few years has seen a major change in the world of cybercrime. Just 4 or 5 years ago, cybercriminals were mostly young male nerds who did it for fun or experimentation. They weren t out to profit from their endeavours. They...2009-03-17
What firewalls do and don’t doHits:1
Over the last few years, security threats to companies have grown and altered dramatically and so have the defences. Traditional firewalls, installed over three years ago, are often not best suited for current threats and don t protect...2009-03-17
Guarantee of service for priority users and customers is of critical importanceHits:1
Increased globalisation, advances in mobile and VPN technology, improved employee productivity and operational cost savings are all major factors which are driving the widespread adoption of remote working business models. From a network...2009-03-17
Ensuring web applications are PCI compliantHits:2
As credit card use has become more widespread both offline and online, and as consumer concern about security has understandably grown, the credit card industries have made an effort to ensure that sensitive information is protected....2009-03-17
Sophos NAC Advanced defends against the risks of unknown PCs trying to access the Great Yarmouth andHits:3
Great Yarmouth and Waveney NHS Primary Care Trust serves a population of more than 200,000. Given the rise in remote working and guests, including both contractors and patients, wishing to connect to the Trust s network either for work...2009-03-16
Chinese Ministry of Railways chooses Juniper Networks Integrated Security Gateway 2000Hits:3
China s Ministry of Railways is in charge of the national railway network, which is the main artery of the country s transport system. The railway system handles a countless number of passengers and huge volume of cargo...2009-03-16

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:5 , Total 13 Pages, Every Page 25 Records, Total Records: 322

Hot Articles
Recommend Articles
New Articles
Sub category