Products and Releases

Content posted in February 2009
Page 1 / 3   >   >>
Secure Passage Survey: Firewall Management A Big Challenge
Products and Releases  |  2/27/2009  | 
Poor firewall management practices lead to security gaps, compliance violations, substandard firewall performance, and premature device purchases
Internet Society Joins Liberty Alliance Management Board
Products and Releases  |  2/27/2009  | 
Group is responsible for driving the strategic direction of Liberty Alliance, the global identity community working to build a more trustworthy Internet
Modulo Integrates Modulo Risk Manager With Comprehensive Security And Compliance Solution
Products and Releases  |  2/27/2009  | 
Solution is designed to address cyber, physical and operational security requirements for SCADA system
SECNAP Enhances SpammerTrap With Email Content Filtering
Products and Releases  |  2/27/2009  | 
New feature enables clients to monitor and control the content of inbound and outbound email messages and enforce policies to prevent sensitive data from being leaked
TrustPort Introduces Net Gateway 5.3
Products and Releases  |  2/27/2009  | 
Solution enhances traffic logging to help network administrator analyze user behavior and identify possible problems
Sentillion Announces Milestones For 2008
Products and Releases  |  2/27/2009  | 
Provider of identity and access management (IAM) solutions signed 30 new customers, among other achievements
charismathics Announces iEnigma Two-Factor Authentication For iPhone
Products and Releases  |  2/27/2009  | 
iEnigma turns the iPhone into a storage device for users' digital identities
Sourcefire Announces 2008 Fourth Quarter, Full Year Results
Products and Releases  |  2/27/2009  | 
"Revenues for the quarter and full year were the highest in the company's history," says Sourcefire CEO John Burris
VeriSign Offers Recommendations On How To Protect From Man-In-The-Middle Attacks
Products and Releases  |  2/26/2009  | 
Common techniques for fooling visitors include phishing e-mails, false wireless hotspots, and most recently poisoning of insecure DNS servers
Sipera Systems Joins RSA Secured Partner Program
Products and Releases  |  2/26/2009  | 
RSA also certifies interoperability between the Sipera IPCS UC security product family and the RSA SecurID two-factor authentication solution
Protegrity Releases Defiance Security Software Suite 4.6
Products and Releases  |  2/26/2009  | 
Expands data protection for Teradata enterprise data warehouse environments with extended security policy management, audit, and encryption functionality
Symantec Research Labs Announces Graduate Fellowship Recipients
Products and Releases  |  2/26/2009  | 
Program is awarded to promising graduate students who demonstrate an interest in investigating innovative solutions to real-world challenges in information security, storage and systems management
Consumer Data Losses 100 Times Worse Than Thought: Report
Products and Releases  |  2/25/2009  | 
Cost of sensitive consumer information that is lost, stolen, or inappropriately accessed exceeds $1 trillion annually, according to report from J. Campana & Associates
VeriSign Delivers Managed PKI For Organizations Needing Interoperability With Federal Government
Products and Releases  |  2/25/2009  | 
VeriSign Non-Federal Shared Service Provider (SSP) PKI facilitates trusted collaboration between federal and state governments and the public and private sector in areas such as domestic security, health care, and academic research
Voltage Security Introduces New Email Encryption Capabilities To SecureMail
Products and Releases  |  2/25/2009  | 
Voltage SecureMail Version 3.5 adds several new upgrades that enables greater ease of adoption while improving scalability and enhancing usability
Georgia Credit Union Adds Data Loss Prevention With Code Green DLP Solution
Products and Releases  |  2/25/2009  | 
CI-1500 Content Inspection Appliance performs ongoing content inspection to ensure that no sensitive data can be transmitted outside of a company's network
Check Point Rolls Out New Software Blade Architecture For Security
Products and Releases  |  2/25/2009  | 
Check Point Software Blade architecture is delivers flexible and manageable security to businesses of all sizes
Lumension Extends Data Protection For Mobile Devices
Products and Releases  |  2/25/2009  | 
Lumension Mobile allows users to centrally control and manage security policies on Windows Mobile devices
Rapid7 Enhances Nexpose Vulnerability Management Solution With Roles-Based Administration
Products and Releases  |  2/25/2009  | 
Expands ability to remediate threats and streamline internal security through NeXpose Security Console
Tufin Technologies Announces General Availability Of SecureChange Workflow
Products and Releases  |  2/24/2009  | 
Solution enables companies to automate the entire network security policy change management life cycle
Triumfant Delivers Zero-Day Malware Protection With Resolution Manager Tool
Products and Releases  |  2/24/2009  | 
Triumfant uses proprietary technology to monitor for malicious changes on the desktop, protecting against both known and unknown threats
Absolute Software Announces Computrace Mobile For BlackBerry
Products and Releases  |  2/24/2009  | 
Absolute rolls out asset management, data protection and geolocation capabilities for the popular BlackBerry platform
Secure Passage Upgrades FireMon Security Analysis Solution
Products and Releases  |  2/24/2009  | 
Solution manages firewall, router, and switch rule bases, provides automated reports, ensures regulatory compliance, and more
SPYRUS, McAfee Team On New USB Encryption Drives
Products and Releases  |  2/24/2009  | 
SPYRUS' Hydra PC USB encryption drives with McAfee antivirus security provides both on-demand and on-access identification and detection of malware and viruses
Symantec Announces February 2009 MessageLabs Intelligence Report
Products and Releases  |  2/24/2009  | 
Cybercriminals embrace the recession and romance while targeted trojans try new fake header techniques
Check Point Releases ZoneAlarm Extreme Security Software Suite
Products and Releases  |  2/24/2009  | 
Check Point integrates security suite with advanced browser virtualization technology to offer Internet security, identity theft protection, safe browsing
Prism Microsystems Unveils Free, Full-Featured Log Search
Products and Releases  |  2/24/2009  | 
EventTracker PULSE delivers in-depth IT intelligence to optimize operations, improve service delivery levels, accelerate troubleshooting, and simplify security forensic investigations
WhiteHat Webinar: Affordable Website Security For The Growing Business
Products and Releases  |  2/24/2009  | 
Designed for growing businesses, the WhiteHat webinar will review affordable, timely, and highly accurate Web application vulnerability management tactics
Axis Technology Rolls Out New Data Masking Product
Products and Releases  |  2/23/2009  | 
DMSuite profiles, provisions, and redacts data without compromising productivity or time-to-market
DIFRwear Offers Faraday Caged Apparel
Products and Releases  |  2/23/2009  | 
Protect your identity with RFID chips embedded in your passport, credit cards, or work badge
AdaptiveMobile Launches Policy Control Framework To Address Surge In Mobile Traffic
Products and Releases  |  2/23/2009  | 
Solutions are designed to save costs for operators by offloading traffic on mobile devices as the growth in data traffic increases
HBGary Prices Responder Field Edition At Less Than $1K
Products and Releases  |  2/23/2009  | 
Responder performs all physical to virtual address mappings, re-creates the object manager, exposes all objects, and enables investigators to perform a complete and comprehensive computer investigation
ECNAP Network Security Partners With Tech Data U.S.
Products and Releases  |  2/23/2009  | 
Technology distributor to offer SpammerTrap Email security solutions, John O'Shea
Global DataGuard Enhances Network Security Zones Technology
Products and Releases  |  2/23/2009  | 
NSZ module provides alternative or complement to cumbersome network access control systems
Novell Acquires Privileged User Management Technology From Fortefi
Products and Releases  |  2/20/2009  | 
Company also acquires perpetual source code license to ActivIdentity's industry-leading single sign-on solution, SecureLogin
Lancope Announces Free StealthWatch FlowSensor VE Appliance For Virtual Network Visibility
Products and Releases  |  2/19/2009  | 
Solution analyzes virtual network traffic to detect and address configuration problems, inefficiencies in resource allocation, security violations, and policy violations before any failure or degraded performance occurs
VeriSign: Internet Domain Names Grow To 177 Million In 2008
Products and Releases  |  2/19/2009  | 
Q4 report highlights efforts by VeriSign, ICANN, and others to internationalize the Internet while preserving reliability and accessibility
Net Optics Rolls Out New Secure Network Monitoring System
Products and Releases  |  2/19/2009  | 
Net Optics iBypass Switch is a passive, inline bypass switch that maintains seamless network flow when deploying an intrusion prevention system
Secure Enterprise Forum IDs Top Web 2.0 Security Threats
Products and Releases  |  2/19/2009  | 
Report highlights threats that are specific to Web 2.0 technologies, as well as "older" threats that are made more pernicious through "Web 2.0-type" behavior
Purewire To Provide Free Web Security For BlackBerry Users
Products and Releases  |  2/19/2009  | 
In conjunction with RIM's BlackBerry ISV Alliance Program, Purewire is offering enterprises access to the Purewire Web Security Service for BlackBerry free of charge
Q1 Labs Launches New Version of QRadar SIEM Solution
Products and Releases  |  2/19/2009  | 
QRadar 6.2 includes enhanced automated capabilities, expanded reports, and increased out-of-the-box functionality
Zecurion Rolls Out Zserver Suite To U.S.
Products and Releases  |  2/19/2009  | 
Zserver Suite protects confidential information at the processing and storage level, employing a multithreaded encryption process that functions transparently and writes encrypted data to the storage media in real-time
New ConSentry Software Provides Real-Time Application And Device Threat Detection
Products and Releases  |  2/19/2009  | 
New correlation engine and "questionable activity" dashboard expose risky protocol behavior
Unisys: 'Consumerization' And Mobility Risks Are Key Drivers For Security Investments
Products and Releases  |  2/19/2009  | 
Economy compels greater need for collaboration, more intelligent systems and better fraud prevention, according to security experts at Unisys
BitDefender Rolls Out Beta Version Of BitDefender QuickScan
Products and Releases  |  2/19/2009  | 
Tool makes use of "in-the-cloud" scanning to determine if files accessed by running processes are malicious
New Smart Card Alliance White Paper Provides Healthcare CFOs With Guide To Smart Cards
Products and Releases  |  2/19/2009  | 
"A Healthcare CFO's Guide to Smart Card Technology and Applications" outlines some of the major challenges faced by healthcare CFOs and discusses how smart card technology can help
Verizon Business Introduces New Portfolio Of Converged Solutions Addressing Security, Performance Challenges
Products and Releases  |  2/19/2009  | 
The new solutions, comprising five converged offerings, will enable companies to build secure, high-performance communications and IT infrastructure to enhance overall business performance
St. Bernard Launches iPrism Web Filter Anonymizer Defense
Products and Releases  |  2/19/2009  | 
Two-layer approach protects against Web-based proxy servers
PandaLabs Warns Computer Users of Sality.AO Virus
Products and Releases  |  2/18/2009  | 
Virus combines dangerous infection techniques of old viruses with new, financially motivated malware schemes
Optenet Introduces HostSecure Automated Content Filter
Products and Releases  |  2/18/2009  | 
HostSecure enables the detection and removal of inappropriate user-generated content on blogs and social networking sites
Page 1 / 3   >   >>

13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
One in Three SOC Analysts Now Job-Hunting
Kelly Jackson Higgins, Executive Editor at Dark Reading,  2/12/2018
Encrypted Attacks Continue to Dog Perimeter Defenses
Ericka Chickowski, Contributing Writer, Dark Reading,  2/14/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: One agent too many was installed on Bob's desktop.
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.