×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

News - Article Archives - Page 438

Putting the infrastructure back in PKI

October 01, 2001 |
Depending on who's talking - and what they stand to gain - you hear the full range of opinions regarding the readiness, ease of deployment, and most importantly, cost, of public key infrastructure (PKI) technology. Back in early 2000, a research firm was predicting the PKI market would be taking in multiple billions of dollars by the early to middle part of this decade. Everyone wanted a piece of the action, since capturing even 0.5% of that pie meant a lot of annual revenue. And with Y2K concerns out of the way, what else was there for IT managers to spend money on?
READ MORE

Risk dictates strength of corporate security

October 01, 2001 |
Network professionals face the perennial job of deciding what type of authentication to have corporate employees and trading partners use for access to corporate resources. Many view passwords as the least secure type of authentication, but find the cost of using better authentication methods, such as handheld tokens or digital certificates, still too high for general use.
READ MORE

President Bush's Focus on Security

October 01, 2001 |
META Group sees President Bush's appointment of a presidential advisor for cyberspace security as a positive move, as it sends a message that computer security is a national priority. This alone should encourage a greater awareness of the needs for computer security, making people more willing to make the extra effort and pay the extra expense to ensure their security. This should continue to drive investment in the security sector and be a positive for the leading security vendors, including Check Point, ISS, Network Associates, RSA, Symantec and VeriSign.
READ MORE

Beating back viruses

October 01, 2001 |
Anna Kournikova, Love Bug, Code Red, Sircam and now Anthrax - the (flawed) worm - brought to you by those fun-loving pranksters of cyberspace.
READ MORE

E-mail security and your legal liability

October 01, 2001 |
All types of organizations are finding the widespread use of e-mail is creating myriad security issues, including one issue commonly overlooked by corporate America: legal liability.
READ MORE

Identrus making headway in e-security effort

September 18, 2001 |
Identrus is making strides in its effort to establish a secure, online community of trust for the financial community. In recent weeks, the company has announced two programs to certify products and applications as compliant with the Identrus infrastructure. In addition, it announced three additional financial institutions have signed on to become members of the Identrus network, bringing the total number of members to 50. The new firms join some 100 vendors that have signed up to get their products and applications certified by Identrus.
READ MORE

Tivoli enhances Policy Director authorization tool

September 18, 2001 |
IBM's Tivoli Systems unit has announced a new version of its Policy Director authorization software that it says is easier to integrate and manage while providing improved performance in large enterprises.
READ MORE

Passlogix puts its signature on single sign-on

September 18, 2001 |
Passlogix has introduced a new version of its single sign-on (SSO) system that now works with multiple Lightweight Directory Access Protocol (LDAP) directories and virtually any type of authentication system. The product also now supports various work modes, including disconnected and roaming among different computers on a network.
READ MORE

Counterpane's managed security monitoring service wins converts

September 18, 2001 |
Counterpane Internet Security, the San Jose, Calif.-based provider of managed security monitoring services, is progressing in its efforts to offer 24x7 security monitoring for customers from its Secure Operations Centers (SOCs) staffed by expert security analysts, says Carolyn Turbyfill, director of software for Counterpane.
READ MORE

So much for secure e-mail

September 01, 2001 |
Encrypted e-mail has flopped in the enterprise.
READ MORE

Handing over the keys to the castle

September 01, 2001 |
Bose Corp. was doing an adequate job using its own staff to protect its network from hacker attacks, but the company wanted to take a more forward-looking and coordinated approach to its WAN-related needs.
READ MORE

Vendors pitch all-in-one security boxes

September 01, 2001 |
Companies looking to simplify their network security setups will soon have a handful of new products to choose from that act as firewalls but include other functions such as VPN and intrusion detection.
READ MORE

RedCreek Authenticator targets HIPAA requirements

August 28, 2001 |
RedCreek Communications has announced a new virtual private network (VPN) product that it says can help health care organizations comply with rigorous new privacy standards quickly and inexpensively.
READ MORE

Security is top concern for IBM users

August 28, 2001 |
After working to link their systems more closely with those of their business partners, IBM customers now say they have heightened concerns about protecting sensitive data and resources from their partners.
READ MORE

RSA's acquisition of Securant gets good reviews

August 28, 2001 |
Experts say RSA Security's acquisition of Securant Technologies provides RSA with an essential element in its security product lineup and should further the cause of integration for customers.
READ MORE

Washington State gets down to business with PKI

August 27, 2001 |
In Washington state, lawyers who want to check clients' worker's compensation claim files can tap into a state-run Web site where they can get the information immediately. Should the lawyers be in private practice, they can tap into the same site to file their quarterly taxes.
READ MORE

Tally's Census now scans for hacker tools

August 06, 2001 |
You've no doubt heard the horror stories about how insiders are responsible for an awful lot of security breaches and miscellaneous other computer-related mischief. Although the numbers are declining, at least according to the latest Computer Security Institute/FBI study, clearly you still need to be concerned about employees who are up to no good.
READ MORE

Hitachi offers up centralized application security platform

August 06, 2001 |
As companies increasingly pursue e-business strategies that call for linking distributed systems and applications, ensuring the security of the systems and the communications channel between them becomes a critical priority.
READ MORE

Ponte delivers platform for centralizing security control

August 06, 2001 |
Rapidly deploying fixes for known security vulnerabilities is a key aspect of any sound security strategy. But consistently meeting that challenge is no mean feat, especially in networks with tens of thousands of devices.
READ MORE

Managed security services: Due diligence required

August 01, 2001 |
FAC/Equities and META Group concur that security is a top priority for most Global 2000 CIOs, but skilled security personnel are still scarce, and solutions remain complex and difficult to integrate. META Group notes that many vendors, hoping to address growing demand, have announced managed security service (MSS) offerings. However, according to META Group, trust, maturity of offerings, and overall market maturity will remain issues until 2003.
READ MORE