Products and Releases

Content posted in February 2009
Page 1 / 3   >   >>
Secure Passage Survey: Firewall Management A Big Challenge
Products and Releases  |  2/27/2009  | 
Poor firewall management practices lead to security gaps, compliance violations, substandard firewall performance, and premature device purchases
Internet Society Joins Liberty Alliance Management Board
Products and Releases  |  2/27/2009  | 
Group is responsible for driving the strategic direction of Liberty Alliance, the global identity community working to build a more trustworthy Internet
Modulo Integrates Modulo Risk Manager With Comprehensive Security And Compliance Solution
Products and Releases  |  2/27/2009  | 
Solution is designed to address cyber, physical and operational security requirements for SCADA system
SECNAP Enhances SpammerTrap With Email Content Filtering
Products and Releases  |  2/27/2009  | 
New feature enables clients to monitor and control the content of inbound and outbound email messages and enforce policies to prevent sensitive data from being leaked
TrustPort Introduces Net Gateway 5.3
Products and Releases  |  2/27/2009  | 
Solution enhances traffic logging to help network administrator analyze user behavior and identify possible problems
Sentillion Announces Milestones For 2008
Products and Releases  |  2/27/2009  | 
Provider of identity and access management (IAM) solutions signed 30 new customers, among other achievements
charismathics Announces iEnigma Two-Factor Authentication For iPhone
Products and Releases  |  2/27/2009  | 
iEnigma turns the iPhone into a storage device for users' digital identities
Sourcefire Announces 2008 Fourth Quarter, Full Year Results
Products and Releases  |  2/27/2009  | 
"Revenues for the quarter and full year were the highest in the company's history," says Sourcefire CEO John Burris
VeriSign Offers Recommendations On How To Protect From Man-In-The-Middle Attacks
Products and Releases  |  2/26/2009  | 
Common techniques for fooling visitors include phishing e-mails, false wireless hotspots, and most recently poisoning of insecure DNS servers
Sipera Systems Joins RSA Secured Partner Program
Products and Releases  |  2/26/2009  | 
RSA also certifies interoperability between the Sipera IPCS UC security product family and the RSA SecurID two-factor authentication solution
Protegrity Releases Defiance Security Software Suite 4.6
Products and Releases  |  2/26/2009  | 
Expands data protection for Teradata enterprise data warehouse environments with extended security policy management, audit, and encryption functionality
Symantec Research Labs Announces Graduate Fellowship Recipients
Products and Releases  |  2/26/2009  | 
Program is awarded to promising graduate students who demonstrate an interest in investigating innovative solutions to real-world challenges in information security, storage and systems management
Consumer Data Losses 100 Times Worse Than Thought: Report
Products and Releases  |  2/25/2009  | 
Cost of sensitive consumer information that is lost, stolen, or inappropriately accessed exceeds $1 trillion annually, according to report from J. Campana & Associates
VeriSign Delivers Managed PKI For Organizations Needing Interoperability With Federal Government
Products and Releases  |  2/25/2009  | 
VeriSign Non-Federal Shared Service Provider (SSP) PKI facilitates trusted collaboration between federal and state governments and the public and private sector in areas such as domestic security, health care, and academic research
Voltage Security Introduces New Email Encryption Capabilities To SecureMail
Products and Releases  |  2/25/2009  | 
Voltage SecureMail Version 3.5 adds several new upgrades that enables greater ease of adoption while improving scalability and enhancing usability
Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution
Products and Releases  |  2/25/2009  | 
CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network
Check Point Rolls Out New Software Blade Architecture For Security
Products and Releases  |  2/25/2009  | 
Check Point Software Blade architecture is delivers flexible and manageable security to businesses of all sizes
Lumension Extends Data Protection For Mobile Devices
Products and Releases  |  2/25/2009  | 
Lumension Mobile allows users to centrally control and manage security policies on Windows Mobile devices
Rapid7 Enhances Nexpose Vulnerability Management Solution With Roles-Based Administration
Products and Releases  |  2/25/2009  | 
Expands ability to remediate threats and streamline internal security through NeXpose Security Console
Tufin Technologies Announces General Availability Of SecureChange Workflow
Products and Releases  |  2/24/2009  | 
Solution enables companies to automate the entire network security policy change management life cycle
Triumfant Delivers Zero-Day Malware Protection With Resolution Manager Tool
Products and Releases  |  2/24/2009  | 
Triumfant uses proprietary technology to monitor for malicious changes on the desktop, protecting against both known and unknown threats
Absolute Software Announces Computrace Mobile For BlackBerry
Products and Releases  |  2/24/2009  | 
Absolute rolls out asset management, data protection and geolocation capabilities for the popular BlackBerry platform
Secure Passage Upgrades FireMon Security Analysis Solution
Products and Releases  |  2/24/2009  | 
Solution manages firewall, router, and switch rule bases, provides automated reports, ensures regulatory compliance, and more
SPYRUS, McAfee Team On New USB Encryption Drives
Products and Releases  |  2/24/2009  | 
SPYRUS' Hydra PC USB encryption drives with McAfee antivirus security provides both on-demand and on-access identification and detection of malware and viruses
Symantec Announces February 2009 MessageLabs Intelligence Report
Products and Releases  |  2/24/2009  | 
Cybercriminals embrace the recession and romance while targeted trojans try new fake header techniques
Check Point Releases ZoneAlarm Extreme Security Software Suite
Products and Releases  |  2/24/2009  | 
Check Point integrates security suite with advanced browser virtualization technology to offer Internet security, identity theft protection, safe browsing
Prism Microsystems Unveils Free, Full-Featured Log Search
Products and Releases  |  2/24/2009  | 
EventTracker PULSE delivers in-depth IT intelligence to optimize operations, improve service delivery levels, accelerate troubleshooting, and simplify security forensic investigations
WhiteHat Webinar: Affordable Website Security For The Growing Business
Products and Releases  |  2/24/2009  | 
Designed for growing businesses, the WhiteHat webinar will review affordable, timely, and highly accurate Web application vulnerability management tactics
Axis Technology Rolls Out New Data Masking Product
Products and Releases  |  2/23/2009  | 
DMSuite profiles, provisions, and redacts data without compromising productivity or time-to-market
DIFRwear Offers Faraday Caged Apparel
Products and Releases  |  2/23/2009  | 
Protect your identity with RFID chips embedded in your passport, credit cards, or work badge
AdaptiveMobile Launches Policy Control Framework To Address Surge In Mobile Traffic
Products and Releases  |  2/23/2009  | 
Solutions are designed to save costs for operators by offloading traffic on mobile devices as the growth in data traffic increases
HBGary Prices Responder Field Edition At Less Than $1K
Products and Releases  |  2/23/2009  | 
Responder performs all physical to virtual address mappings, re-creates the object manager, exposes all objects, and enables investigators to perform a complete and comprehensive computer investigation
ECNAP Network Security Partners With Tech Data U.S.
Products and Releases  |  2/23/2009  | 
Technology distributor to offer SpammerTrap Email security solutions, John O'Shea
Global DataGuard Enhances Network Security Zones Technology
Products and Releases  |  2/23/2009  | 
NSZ module provides alternative or complement to cumbersome network access control systems
Novell Acquires Privileged User Management Technology From Fortefi
Products and Releases  |  2/20/2009  | 
Company also acquires perpetual source code license to ActivIdentity's industry-leading single sign-on solution, SecureLogin
Lancope Announces Free StealthWatch FlowSensor VE Appliance For Virtual Network Visibility
Products and Releases  |  2/19/2009  | 
Solution analyzes virtual network traffic to detect and address configuration problems, inefficiencies in resource allocation, security violations, and policy violations before any failure or degraded performance occurs
VeriSign: Internet Domain Names Grow To 177 Million In 2008
Products and Releases  |  2/19/2009  | 
Q4 report highlights efforts by VeriSign, ICANN, and others to internationalize the Internet while preserving reliability and accessibility
Net Optics Rolls Out New Secure Network Monitoring System
Products and Releases  |  2/19/2009  | 
Net Optics iBypass Switch is a passive, inline bypass switch that maintains seamless network flow when deploying an intrusion prevention system
Secure Enterprise Forum IDs Top Web 2.0 Security Threats
Products and Releases  |  2/19/2009  | 
Report highlights threats that are specific to Web 2.0 technologies, as well as "older" threats that are made more pernicious through "Web 2.0-type" behavior
Purewire To Provide Free Web Security For BlackBerry Users
Products and Releases  |  2/19/2009  | 
In conjunction with RIM's BlackBerry ISV Alliance Program, Purewire is offering enterprises access to the Purewire Web Security Service for BlackBerry free of charge
Q1 Labs Launches New Version of QRadar SIEM Solution
Products and Releases  |  2/19/2009  | 
QRadar 6.2 includes enhanced automated capabilities, expanded reports, and increased out-of-the-box functionality
Zecurion Rolls Out Zserver Suite To U.S.
Products and Releases  |  2/19/2009  | 
Zserver Suite protects confidential information at the processing and storage level, employing a multithreaded encryption process that functions transparently and writes encrypted data to the storage media in real-time
New ConSentry Software Provides Real-Time Application And Device Threat Detection
Products and Releases  |  2/19/2009  | 
New correlation engine and "questionable activity" dashboard expose risky protocol behavior
Unisys: 'Consumerization' And Mobility Risks Are Key Drivers For Security Investments
Products and Releases  |  2/19/2009  | 
Economy compels greater need for collaboration, more intelligent systems and better fraud prevention, according to security experts at Unisys
BitDefender Rolls Out Beta Version Of BitDefender QuickScan
Products and Releases  |  2/19/2009  | 
Tool makes use of "in-the-cloud" scanning to determine if files accessed by running processes are malicious
New Smart Card Alliance White Paper Provides Healthcare CFOs With Guide To Smart Cards
Products and Releases  |  2/19/2009  | 
"A Healthcare CFO's Guide to Smart Card Technology and Applications" outlines some of the major challenges faced by healthcare CFOs and discusses how smart card technology can help
Verizon Business Introduces New Portfolio Of Converged Solutions Addressing Security, Performance Challenges
Products and Releases  |  2/19/2009  | 
The new solutions, comprising five converged offerings, will enable companies to build secure, high-performance communications and IT infrastructure to enhance overall business performance
St. Bernard Launches iPrism Web Filter Anonymizer Defense
Products and Releases  |  2/19/2009  | 
Two-layer approach protects against Web-based proxy servers
PandaLabs Warns Computer Users of Sality.AO Virus
Products and Releases  |  2/18/2009  | 
Virus combines dangerous infection techniques of old viruses with new, financially motivated malware schemes
Optenet Introduces HostSecure Automated Content Filter
Products and Releases  |  2/18/2009  | 
HostSecure enables the detection and removal of inappropriate user-generated content on blogs and social networking sites
Page 1 / 3   >   >>


Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19349
PUBLISHED: 2018-11-17
In SeaCMS v6.64, there is SQL injection via the admin_makehtml.php topic parameter because of mishandling in include/mkhtml.func.php.
CVE-2018-19350
PUBLISHED: 2018-11-17
In SeaCMS v6.6.4, there is stored XSS via the member.php?action=chgpwdsubmit email parameter during a password change, as demonstrated by a data: URL in an OBJECT element.
CVE-2018-19341
PUBLISHED: 2018-11-17
The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation near NULL starting at FoxitReader...
CVE-2018-19342
PUBLISHED: 2018-11-17
The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information via a U3D sample because of a "Read Access Violation starting at U3DBrowser+0x00000000...
CVE-2018-19343
PUBLISHED: 2018-11-17
The u3d plugin 9.3.0.10809 (aka plugins\U3DBrowser.fpi) in FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read), obtain sensitive information, or possibly have unspecified other impact via a U3D sample because of a "Data from Faul...