LAS VEGAS—IBM closed the deal to buy Princeton Softech in September, making it another appendage in a body of acquisitions Big Blue has made around its Information On Demand initiative. But to hear those at newly acquired Princeton Softech tell it, the purchase was not a case of a larger company gobbling up a smaller […]
Officials at FaceTime Communications see no gray area when it comes to the spread of greynets in enterprises. Greynets are real-time communication applications such as Skype, instant messaging and peer-to-peer applications that are typically downloaded by users without the permission or knowledge of the IT staff. In its report “Use of Greynets: 3rd Annual Survey […]
IBMs next version of its DB2 data server, code-named Viper 2, is set to slither onto the scene with a new set of data automation and performance enhancements that company officials believe will extend its information on-demand initiative and challenge database giant Oracle. DB2 9.5, which will be available Oct. 31, completes the companys yearlong […]
Core Security Technologies is adding Web application penetration testing to the latest version of its security assurance tool. Set to be released within 30 days, Core Impact Version 7.5s new abilities mark an increased recognition of the vulnerabilities affecting Web applications by the Boston-based firm, which started out focusing on testing of network servers and […]
Reconnexs latest iGuard DLP appliance, Version 7.0, aims to help enterprises build the virtual walls of data protection by determining where those walls go and which employees should be allowed to scale them. The device correlates and analyzes data with its Content Analytics Engine to help businesses determine which employees should have access to sensitive […]
WabiSabiLabi made a bit of a scene when officials there announced they created a marketplace for security researchers to hawk their findings to the highest bidder. Roughly two months after its creation, company officials are touting what they say is the success of their marketplace, which has had some 160,000 unique visitors, and is looking […]
Palo Alto Networks officials are hoping integration with Microsoft Active Directory will serve as an accelerant of sorts for their new firewall product. The Alviso, Calif.-based company is enhancing the PAN-OS software running on the PA-4000 Series firewall. The product now transparently integrates with Active Directory, offering a window into application use by either individual […]
A critical patch update from Oracle planned for next Tuesday includes 51 security fixes affecting numerous Oracle products. According to an advisory posted on the application vendors Web site, 27 of the fixes address issues in Oracles database products, five of which concern vulnerabilities that can be exploited remotely without user authentication. The vulnerabilities addressed […]
When it comes to data leaks, most of the talk is about hackers breaking into networks or employees e-mailing and downloading sensitive information. But some vendors are paying more attention to the preproduction environment, where there are often security holes big enough to push a hard drive through. “The development environment and quality assurance environment […]
AirTight Networks hopes to tighten its grip on wireless security threats with new location-based policy management controls built into the latest version of its SpectraGuard product. Built from the ground up to support managed services for a large geographically dispersed installation, SpectraGuard Enterprise 5.5 is designed to simplify security and administration of a distributed WLAN […]