Your are here:hacking technology > firewall > Article list

Home > firewall > Page 6
New version of Downadup worm infects Windows workstations and servers on corporate networksHits:3
A new version of the Downadup worm infects Windows workstations and servers on corporate networks. Since the new year, F-Secure has received several reports of corporate network infections and is working closely with these companies,...2009-03-12
Integralis secures NHS Blood and Transplant laptop and desktop PCs against data loss and theftHits:2
NHS Blood and Transplant collects, processes, stores and issues 2.1 million blood donations per year from its 15 blood centres in England and north Wales, as well as managing the sourcing of organs for transplantation across the UK...2009-03-12
When Web 2.0 means Threat 2.0Hits:2
All manner of companies are beginning to adopt Web 2.0 technologies, encouraging employee blogs, customer forums, greater use of multi-media content and images and self-created encyclopaedias (or wikis). As with all new technologies, there...2009-03-11
Secure your communications against Cyber warfareHits:2
More and more organisations emergency services, government departments and financial institutions hold information nationally and access it nationally, and, in some cases, offshore it. There is relatively little offshoring of information...2009-03-11
Firewalls and Intrusion Detection Systems do not provide enough protectionHits:5
More than four out of every five (85 percent) U.S. businesses have experienced a data breach, according to a recent study by law firm Scott + Scott, putting millions of consumers' Social Security numbers and other sensitive information...2009-03-10
Comodo Internet Security denies access to all software that is not on the Comodo whitelistHits:2
Comodo Internet Security comprises Comodo's proprietary firewall and antivirus software. Comodo Internet Security puts power in the hands of the people with a default deny approach to installing software. The suite includes both firewall...2009-03-10
From phishing scams to pharmingHits:1
Recent press abounds with new, innovative spam and phishing attacks. For years it was just email that organisations had to fear, but this has changed rapidly with attacks now appearing from all directions. Instant messaging, message boards...2009-03-05
phion Web Application Firewall protects Bank Sarasin against intrudersHits:4
Bank Sarasin is a leading Swiss private bank. In Switzerland the bank has offices in Basel (headquarters), Geneva, Lugano and Zurich. Bank Sarasin and phion have announced they are expanding their partnership. This means that the phion Web...2009-03-05
Check Point UTM-1 130 provides all-inclusive security gateway to small businessesHits:3
Check Point Software Technologies Ltd. has announced the expansion of its UTM-1 Total Security appliance line with the addition of a new model, UTM-1 130, providing small businesses and branch offices an all-inclusive security gateway to...2009-03-04
Outbound Internet connections must be as tightly secured as inbound connectionsHits:1
Companies should apply the same stringent security controls to information leaving their network as they do to inbound information. Over the last two months, Network Box has seen a significant increase in requests...2009-03-04
SanDisk Offers McAfee Anti-Malware Technology in Secure USB Flash DrivesHits:1
SanDisk Corporation and McAfee, Inc. have announced SanDisk Cruzer Enterprise with anti-malware protection from McAfee. In addition to protecting corporate USB flash drive users from data leaks, the solution includes the McAfee Scan Engine...2009-02-26
Optenet Enables Service Providers to Extend Bandwidth Monitoring and Control ServicesHits:6
Optenet has enhanced its content security solution to include new bandwidth optimisation functionality. Optenet Bandwidth Management (OBM) offers service providers a sophisticated management tool that enables highly granular, real-time...2009-02-26
Network Defence secures Accord Housing Association corporate business informationHits:2
The Accord Housing Association has deployed a real-time web security solution from Network Defence to secure its corporate business information and increase employee productivity. The unified threat management...2009-02-26
Indian Police on the hunt for poorly secured wireless connectionsHits:1
At a conference in Mumbai last week, 80 policemen were taught about Wi-Fi connections and cybercrime and given the authority to order the owners of wireless routers to properly secure them with encryption and passwords. Police in...2009-02-24
Indian Police on the hunt for poorly secured wireless connectionsHits:2
At a conference in Mumbai last week, 80 policemen were taught about Wi-Fi connections and cybercrime and given the authority to order the owners of wireless routers to properly secure them with encryption and passwords. Police in...2009-02-24
Traditional security is not stopping network attacksHits:3
Gone are the days when we could use the castle and moat analogy to describe the way the network perimeter protected a company s internal resources from external threats. Now, it s far more complicated. There are bridges...2009-02-24
Airlock Web Application Firewall keeps unauthorised visitors out of Herba Chemosan portalHits:2
Herba Chemosan is Austria s industry leader in pharmaceutical distribution. Almost every second medicine or health product sold over the counter in an Austrian pharmacist originates from one of the seven national Herba Chemosan logistics...2009-02-24
Most employees are unaware of corporate security directives or tend to ignore themHits:1
Most large organizations maintain a detailed corporate security policy document that spells out the dos and don'ts of information security. Once the policy is in place, the feeling is of having achieved 'nine-tenths of the law', that is,...2009-02-24
Bangchak Petroleum deploys Juniper Networks SSG Series to provide secure LAN WAN connectivityHits:2
Bangchak Petroleum is a Thai energy company which operates an oil refinery with a capacity of 120,000 barrels per day. In the face of market competition, Bangchak looked to IT to help drive business growth. According to Mr. Wattana...2009-02-24
Secure access solution with strong dual factor optical authentication safeguards confidential data fHits:3
BeCrypt has teamed up with Distributed Management Systems (DMS) to provided an integrated highly secure solution based on Trusted Client and CASQUE. BeCrypt's Trusted Client provides low-cost, secure remote access to corporate networks...2009-02-20
Selecting an Application Security Assurance ApproachHits:1
This case study from company ABC discusses ways to develop and maintain secure systems and applications, including selecting suitable static-analysis code scanning tools for application development. ABC is...2009-02-20
EMD implements AppGate unified network access control solutionHits:1
EMD, a professional services firm based in Malta, has installed the network access control solution from AppGate Network Security to ensure that client information and communications remain confidential and secure...2009-02-20
EpiForce single-platform security solution protects both virtual and physical networksHits:2
Apani has announced the launch of EpiForce 3.5, the newest version of its single-platform security solution for protecting both virtual and physical networks. EpiForce 3.5 adds identity-based access control and encryption to create...2009-02-20
Sophos NAC Advanced defends against the risks of unknown PCs trying to access the Great Yarmouth andHits:6
Great Yarmouth and Waveney NHS Primary Care Trust serves a population of more than 200,000. Given the rise in remote working and guests, including both contractors and patients, wishing to connect to the Trust s network either for work...2009-02-18
Chinese Ministry of Railways chooses Juniper Networks Integrated Security Gateway 2000Hits:2
China s Ministry of Railways is in charge of the national railway network, which is the main artery of the country s transport system. The railway system handles a countless number of passengers and huge volume of cargo...2009-02-18

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:6 , Total 13 Pages, Every Page 25 Records, Total Records: 322

Hot Articles
Recommend Articles
New Articles
Sub category