dcsimg

John Desmond - Article Archives - Page 6

Archer Updates Enterprise Security Platform

August 4, 2003
Enterprise security management software provider Archer Technologies releases the latest version of platform for managing security systems.
READ MORE

CERT, ArcSight Partner With 3 Universities On Security Sharing

August 1, 2003
Security software vendor ArcSight is joining the CERT Coordination Center to assist in implementing the Cyber Security Information Sharing Project, a partnership intended to provide a secure information sharing environment across a community of organizations.
READ MORE

Meta Group Slams Wireless LAN Suppliers on Security

August 1, 2003
Suppliers of wireless LAN products are falling short in efforts to deliver highly secure products that are interoperable with those of other vendors, according to a report from the Meta Group.
READ MORE

Applying Adaptive Analysis to IIS Message Streams

July 30, 2003
ThreatSentry from Privacyware is an advanced neural application that combines modeled metrics and machine learning to protect from known and undocumented network threats.
READ MORE

Roles or Rules: The Access Control Debate

July 29, 2003
Role-based access control products are challenging to implement and may need to be combined with rule-based and other access control methods to achieve practical value, according to a Burton Group analyst.
READ MORE

FireBall Suite Offers Layers of Security

July 28, 2003
The FireBall CyberProtection Suite from RedCannon Security is aimed at securing individual laptop or desktop PCs with multiple layers of security protection, integrated within a single newly developed system.
READ MORE

Managing Identity Data Across Directories

July 17, 2003
Waveset Lighthouse Directory Master from Waveset Technologies is designed to identity data across different directory environments, allowing organizations to create an identity management metadata layer.
READ MORE

Software Analyzes Cost Benefit of Security Alternatives

July 16, 2003
The latest version of International Security Technology's cost of tisk analysis product allows risk analysts to define recovery in terms of the ideal amount of time an organization needs to recover from a security exposure.
READ MORE

IBM Develops New Language for Writing Privacy Policies

July 14, 2003
Big Blue has developed a programming language designed to automate the writing of privacy policies, with contributions from a research lab in Zurich and customers of the IBM Tivoli Privacy Manager in the U.S.
READ MORE

Intact 3.5 Automates Building of Change Detection Baseline

July 8, 2003
The latest version of Pedestal Software's Intact change detection and recovery product offers automatic configuration based on system behavior.
READ MORE

Neoteris Extends Appliance Line to Support Secure On-Line Meetings

July 7, 2003
Secure access product vendor Neoteris extends its application security appliance family to offer a hardened appliance for securing online meetings.
READ MORE

New ID-Synch Access Management Software Ties to HR Systems

July 1, 2003
M-Tech Information Technology adds several new features to the latest version of ID-Synch, the company's access management product.
READ MORE

TippingPoint Extends Intrusion Prevention Appliance

June 30, 2003
Network security products vendor TippingPoint Technologies extends its UnityOne intrusion prevention system appliance line with the 200 model, able to process packets at 200M bit/sec.
READ MORE

New Trusted Network Software Controls Access At Packet Level

June 27, 2003
Identity 1.0 from Trusted Network Technologies is an identity-based access control product that controls access to critical assets and applications in real time at the packet-level.
READ MORE

ActivCard Extends Support to Linux, Solaris, MacOS

June 26, 2003
Identity management software vendor ActivCard unveils three new versions of its ActivCard Gold smart card-based authentication and digital signature product set.
READ MORE

Industrial Defender Aims to Protect Critical Infrastructure

June 26, 2003
Security software vendor Verano's latest release is geared toward industrial network control environments, especially power generation plants, energy distribution systems and water treatment plants.
READ MORE

Liquid Machines Launches Desktop Security Policy Software

June 25, 2003
Information security management vendor Liquid Machines unveils a security management product that allows enterprises to assign security policies for users of standard desktop applications such as Microsoft Office and Adobe Acrobat.
READ MORE

Tivoli Risk Manager Now Protects Databases

June 17, 2003
IBM's Tivoli Risk Manager has been extended to help companies protect databases from security threats, malicious users and other vulnerabilities that may compromise data integrity or database performance.
READ MORE

Talking Smack About Spam

June 16, 2003
Protection from spam for $1 per user is the business proposition from service provider ProExchange via its soon-to-be-released Spam Smacker software.
READ MORE