News - Article Archives - Page 438

E-mail security and your legal liability

October 01, 2001 |
All types of organizations are finding the widespread use of e-mail is creating myriad security issues, including one issue commonly overlooked by corporate America: legal liability.
READ MORE

Identrus making headway in e-security effort

September 18, 2001 |
Identrus is making strides in its effort to establish a secure, online community of trust for the financial community. In recent weeks, the company has announced two programs to certify products and applications as compliant with the Identrus infrastructure. In addition, it announced three additional financial institutions have signed on to become members of the Identrus network, bringing the total number of members to 50. The new firms join some 100 vendors that have signed up to get their products and applications certified by Identrus.
READ MORE

Tivoli enhances Policy Director authorization tool

September 18, 2001 |
IBM's Tivoli Systems unit has announced a new version of its Policy Director authorization software that it says is easier to integrate and manage while providing improved performance in large enterprises.
READ MORE

Passlogix puts its signature on single sign-on

September 18, 2001 |
Passlogix has introduced a new version of its single sign-on (SSO) system that now works with multiple Lightweight Directory Access Protocol (LDAP) directories and virtually any type of authentication system. The product also now supports various work modes, including disconnected and roaming among different computers on a network.
READ MORE

Counterpane's managed security monitoring service wins converts

September 18, 2001 |
Counterpane Internet Security, the San Jose, Calif.-based provider of managed security monitoring services, is progressing in its efforts to offer 24x7 security monitoring for customers from its Secure Operations Centers (SOCs) staffed by expert security analysts, says Carolyn Turbyfill, director of software for Counterpane.
READ MORE

So much for secure e-mail

September 01, 2001 |
Encrypted e-mail has flopped in the enterprise.
READ MORE

Tucker Anthony Sutro's quarterly security market update

September 01, 2001 |
In their quarterly report on the health of the information security market, Frederick D. Ziegel and John D. Hall of Tucker Anthony Sutro report that while few, if any, technology companies have made it through the current information technology slowdown without trimming or obliterating expectations, the information security sector continues to grow in importance among purchasers of information technology.
READ MORE

Handing over the keys to the castle

September 01, 2001 |
Bose Corp. was doing an adequate job using its own staff to protect its network from hacker attacks, but the company wanted to take a more forward-looking and coordinated approach to its WAN-related needs.
READ MORE

Vendors pitch all-in-one security boxes

September 01, 2001 |
Companies looking to simplify their network security setups will soon have a handful of new products to choose from that act as firewalls but include other functions such as VPN and intrusion detection.
READ MORE

RedCreek Authenticator targets HIPAA requirements

August 28, 2001 |
RedCreek Communications has announced a new virtual private network (VPN) product that it says can help health care organizations comply with rigorous new privacy standards quickly and inexpensively.
READ MORE

Security is top concern for IBM users

August 28, 2001 |
After working to link their systems more closely with those of their business partners, IBM customers now say they have heightened concerns about protecting sensitive data and resources from their partners.
READ MORE

RSA's acquisition of Securant gets good reviews

August 28, 2001 |
Experts say RSA Security's acquisition of Securant Technologies provides RSA with an essential element in its security product lineup and should further the cause of integration for customers.
READ MORE

Washington State gets down to business with PKI

August 27, 2001 |
In Washington state, lawyers who want to check clients' worker's compensation claim files can tap into a state-run Web site where they can get the information immediately. Should the lawyers be in private practice, they can tap into the same site to file their quarterly taxes.
READ MORE

Tally's Census now scans for hacker tools

August 06, 2001 |
You've no doubt heard the horror stories about how insiders are responsible for an awful lot of security breaches and miscellaneous other computer-related mischief. Although the numbers are declining, at least according to the latest Computer Security Institute/FBI study, clearly you still need to be concerned about employees who are up to no good.
READ MORE

Hitachi offers up centralized application security platform

August 06, 2001 |
As companies increasingly pursue e-business strategies that call for linking distributed systems and applications, ensuring the security of the systems and the communications channel between them becomes a critical priority.
READ MORE

Ponte delivers platform for centralizing security control

August 06, 2001 |
Rapidly deploying fixes for known security vulnerabilities is a key aspect of any sound security strategy. But consistently meeting that challenge is no mean feat, especially in networks with tens of thousands of devices.
READ MORE

Managed security services: Due diligence required

August 01, 2001 |
FAC/Equities and META Group concur that security is a top priority for most Global 2000 CIOs, but skilled security personnel are still scarce, and solutions remain complex and difficult to integrate. META Group notes that many vendors, hoping to address growing demand, have announced managed security service (MSS) offerings. However, according to META Group, trust, maturity of offerings, and overall market maturity will remain issues until 2003.
READ MORE

Siding with the judges on privacy issues

August 01, 2001 |
Federal judges are showing some proper perspective when it comes to matters of security and privacy, even when it means putting good guys in their place.
READ MORE

PKI policy in the business environment

August 01, 2001 |
In the traditional world, the individual moves through differing process and policy environments in which varying policies govern their interactions with others. As one example, governments face the problem of enabling and managing cross-border travel and immigration. To address such requirements, government law and/or policy typically require citizens crossing national boundaries to possess passports that establish citizenship and identity. A passport links or "binds" some information about the individual (photograph, height, weight, age) to a specially designed physical document having a unique issuing authority and control number.
READ MORE

Exploring the state of enterprise security management

August 01, 2001 |
Investments in enterprise security management (ESM) tools have been on the rise in the last few years due to an increasing awareness by organizations that they need to better leverage the investments they've made in a variety of information security point products. How are those products working? How do you know if your company is being attacked? How can volumes of log files be monitored in real time so that an attack can be met with a proactive response?
READ MORE