IronPort Systems is offering data loss prevention and encryption capability for e-mail in the AsyncOS operating system powering its e-mail security appliances. The introduction Sept. 11 of this DLP (data leak prevention) functionality into the IronPort appliances gives corporate IT teams a single, fully integrated solution that combines the traditional e-mail security functions of spam […]
Cisco Systems is expanding its network access control offerings in a move company officials said will cut complexity, the cost of operations and extend security at the endpoint. The San Jose, Calif., company Sept. 10 launched the NAC Network Module, a plug-in module that integrates Ciscos NAC technology into its Integrated Services Routers. The module […]
PatchLink has a new name, Lumension Security, and a new game—delivering comprehensive, unified protection and control over enterprise endpoints. Lumension Security is the result of a new focus for the company, which has sought to broaden its security footprint in the past several months. As PatchLink, officials acquired endpoint security vendor SecureWave and the STAT […]
Cyberoam, a division of Elitecore Technologies, has added features to its CR Series security appliances in a move partially meant to increase its appeal to enterprises. Cyberoams identity-based UTM (unified threat management) products provide a range of security features including identity-based firewall, VPN, gateway antivirus, gateway anti-spam, intrusion detection and prevention and content filtering. The […]
Robert Whiteley and Natalie Lambert have seen the future—and in it, traditional network security is dead. At least that is the message the two Forrester Research analysts delivered to a crowd at the Forrester Security Forum in Atlanta Sept. 6. According to them, in the next five years the Internet will be the primary connectivity […]
F-Secure is releasing its Internet Security 2008 product with new parental controls, improved anti-phishing features and a free trial version of anti-virus software for mobile devices. With Internet Security 2008, released Sept. 3, F-Secure officials said they have improved the detection and scanning performance of phishing mail, as well as added a plug-in to allow […]
Researchers at Fortinet call it Confusion 2.0—the unlearning of the golden rule of the Web: “Never give out any log-in credentials to an online service, regardless of the reason for the request.” But in their latest report on malware trends, they warned that some of the golden rules shine has rubbed off as users are […]
ATLANTA – Monster.com, TJX, Pfizer-the list of companies and organizations affected by database breaches grows bigger and badder every week, but most enterprises remain focused on the perimeter and ignore the database. Some 80 percent of enterprises lack a basic database security plan, according to Forrester Research surveys. “People take it for granted that databases […]
The cyber-crooks behind the data breach affecting Monster.com also stole personal information from 146,000 people who use USAJobs, a job-hunting site for the federal government. Monster Worldwide is the technology provider for the USAJobs.gov Web site, which is run by the U.S. Office of Personnel Management. USAJobs.gov has 2 million subscribers, and users can post […]
An international study by online market research firm InsightExpress revealed many businesses plan to increase spending on security for their wireless networks in the next year. Almost three out of every four IT decision makers said security spending will increase over the next fiscal year in an effort to accommodate growing wireless and mobility requirements, […]