Products and Releases

Content posted in February 2010
Page 1 / 2   >   >>
TippingPoint Introduces SSL Security Protection Customized For Data Centers Hosting Web Applications
Products and Releases  |  2/26/2010  | 
TippingPoint 1500S prevents encrypted attacks from compromising Web servers and Web applications
New Mobile VoIP Encryption Announced
Products and Releases  |  2/26/2010  | 
Smartphone Protector now complete with VoiceCrypto
Damballa Launches Realtime Botnet Termination
Products and Releases  |  2/26/2010  | 
Active Threat Termination identifies and stops malicious network activity without disrupting employee productivity or legitimate communications
TippingPoint Introduces New Products To Secure Virtualized Next-Generation Data Centers
Products and Releases  |  2/26/2010  | 
vController provides a data center security solution that addresses challenges of securing both virtual and physical infrastructure
Lumension Unveils Intelligent Application Whitelisting that Operationalizes A Proactive Endpoint Security Approach
Products and Releases  |  2/26/2010  | 
Lumension's Intelligent Whitelisting leverages both blacklisting and whitelisting approaches to deliver a more effective and operational endpoint security solution
Anonymous Browsing, Email Service Launched
Products and Releases  |  2/25/2010  | 
ConnectInPrivate.com offers a five-step suite for guaranteeing privacy online
New Single Sign-On From ActivIdentity
Products and Releases  |  2/25/2010  | 
Offering combines single sign-on password management with a strong authentication platform
FTC Issues Report Of 2009 Top Consumer Complaints
Products and Releases  |  2/24/2010  | 
Federal Trade Commission released a report listing top complaints consumers filed with the agency in 2009
Dasient Introduces Malware Protection Seal For Websites
Products and Releases  |  2/24/2010  | 
Dasient SafeSite seal is the world's first recognized security seal specifically for malware protection
Sophos Offered On Lenovo PCs
Products and Releases  |  2/24/2010  | 
Lenovo will offer Sophos security and data protection technology bundles with new Think-branded PCs
Arxan Launches Application Hardening For Mac Apps
Products and Releases  |  2/24/2010  | 
Extends GuardIT software protection solution to encompass applications targeted for the Mac OS X platform
Courion Upgrades ID And Access Management Solution
Products and Releases  |  2/24/2010  | 
Reduces risk and cost of compliance management by combining identity and access management, sensitive data management, and user activity monitoring
ActivIdentity And idOnDemand Partner For Cloud Security
Products and Releases  |  2/24/2010  | 
idOnDemand will integrate ActivIdentity's ActivID technology to provide a cloud-based system for issuing and managing smart cards
SecuWipe Deletes Data From Stolen Or Lost Windows Phones And Windows CE Terminals
Products and Releases  |  2/24/2010  | 
Latest version from Aiko Solutions offers full approach to protecting user identity and sensitive data in case of mobile phone theft or loss
Guardian Analytics Announces FraudMAP For Business Banking
Products and Releases  |  2/24/2010  | 
Company announces first solution to protect online business banking accounts and prevent fraud from login to logout
Key Pair Technologies Announces Cloud Security And Virtualization Product Family
Products and Releases  |  2/24/2010  | 
Three new solutions address need for increasingly tighter and more integrated security solutions
Centrify Delivers DirectSecure For Next-Generation Protection Of Cross-Platform Systems
Products and Releases  |  2/24/2010  | 
Centrify DirectSecure secures sensitive information by isolating and protecting cross-platform systems and by enabling end-to-end encryption of data in motion
HyTrust Announces $10.5 M In Series B Funding, Adds Cisco And Granite Ventures
Products and Releases  |  2/24/2010  | 
HyTrust will use the capital to drive development, sales, and marketing
Mocapay Unveils Secure Mobile Payments
Products and Releases  |  2/24/2010  | 
Newly patented technology creates single solution to conduct secure mobile transactions in a multichannel environment
3Com Delivers On Secure Network Fabric Strategy With New Solutions For Next-Generation Data Centers
Products and Releases  |  2/24/2010  | 
Four new solutions for large enterprises broadens the Secure Network Fabric in the virtualized data center
Qualys Launches Cloud Computing Solution For FDCC Compliance
Products and Releases  |  2/24/2010  | 
QualysGuard FDCC module helps federal agencies validate the configuration of their desktops according to FDCC regulations
Palo Alto Networks Rolls Out New Next-Generation Firewall Software
Products and Releases  |  2/23/2010  | 
PAN-OS 3.1 software enables finer-grained control over business and Web 2.0 applications for enterprises and distributed computing environments
TippingPoint Rolls Out New IPS For Virtual Environments
Products and Releases  |  2/23/2010  | 
vController provides a comprehensive data center security solution
Melissa Hathaway, John Stewart, Roland Cloutier Join Core's Advisory Board
Products and Releases  |  2/23/2010  | 
Trio will play a significant role in guiding Core's future mission and in achieving those goals
Agiliance Integrates With VeriSign iDefense
Products and Releases  |  2/23/2010  | 
Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides threat and vulnerability protection
BreakingPoint Announces Major Revenue Growth
Products and Releases  |  2/23/2010  | 
Patent-pending technology provides a scientific method of subjecting cyber-infrastructure elements to hostile and high-stress network conditions in order to measure their resiliency
Petition To Congress On E-Banking Security
Products and Releases  |  2/23/2010  | 
Authentify to ask security pros to get politically active to protect America's SMBs
Rapid7 Announces Exploit Index
Products and Releases  |  2/23/2010  | 
Adds Exploit Exposure to its vulnerability management product, NeXpose
Fasoo To Launch/Demo New Enterprise DRM Solution At RSA
Products and Releases  |  2/23/2010  | 
Fasoo Context-Sensitive DRM scans documents for sensitive information and automatically encrypts them with predefined security policies
Zscaler Publishes 'State of the Web' Report For Q4 2009
Products and Releases  |  2/23/2010  | 
Research details trends and security threats for corporate end users on the Web
Endace Introduces Next Generation, Carrier-Grade Intrusion Detection Solution
Products and Releases  |  2/23/2010  | 
Endace IDS combines multiple critical IT security systems into a single, fully integrated workflow
Rapid7 NeXpose Leverages Metasploit Data, Exploit Database
Products and Releases  |  2/23/2010  | 
Exploit Exposure provides users with deeper insight into the breach paths for vulnerabilities identified across multiple threat vectors
Alert Logic Launches LogReview For PCI
Products and Releases  |  2/22/2010  | 
Using Log Manager, Alert Logic security analysts review log data daily for suspicious activity or security concerns within customer network
Internet Tops 192 Million Domain Name Registrations
Products and Releases  |  2/22/2010  | 
Overall base of .com and .net domain names grew to 96.7 million domain names at the end of 2009
nCircle Announces Patch Priority Index
Products and Releases  |  2/22/2010  | 
Patch Priority Index rankings are based on nCircle's Risk Score
Utah High School Team Wins CyberPatriot II Competition
Products and Releases  |  2/22/2010  | 
Winning team narrowly defeated Team Curry, from Burlington, N.C.
FTC Probe Uncovers Widespread Data Breaches Via P2P Networks
Products and Releases  |  2/22/2010  | 
Close to 100 organizations have been notified that personal data has been shared
SHI And Solutionary Announce Partnership In Managed Security Services
Products and Releases  |  2/22/2010  | 
Solutionary to provide managed security services through SHI's Information Security and Risk Management Practice
Triumfant Issues RSA 2010 Malware Detection Challenge
Products and Releases  |  2/22/2010  | 
Company aims to show how its Resolution Manager solution can detect, analyze and remove all remnants of any malware infection
IBM, Thales Team In Key Management For Storage Encryption
Products and Releases  |  2/22/2010  | 
TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products
IBM, Gemalto Team In Authentication
Products and Releases  |  2/19/2010  | 
Protiva security solution simplifies authentication for users
Trustwave Rolls Out DLP Application
Products and Releases  |  2/19/2010  | 
Scanning application evaluates content risk of identified targets
Comodo Rolls Out Dragon Browser Based On Chromium Project
Products and Releases  |  2/19/2010  | 
Comodo Dragon protects Internet users from inadvertently exposing information about themselves
Fidelis DLP Solution Takes Advantage Of Virtualization
Products and Releases  |  2/19/2010  | 
Rolls out Fidelis Extrusion Prevention System on VMware-based virtual appliances
41st Parameter Expands European Operations
Products and Releases  |  2/19/2010  | 
Also appoints information security veteran David Curran as vice president of its EMEA region
Avecto Releases Privilege Guard 2.5 And Extends Windows 7 UAC Capabilities
Products and Releases  |  2/19/2010  | 
In addition to tighter UAC integration, Privilege Guard 2.5 introduces many new features
CA Joins Cloud Security Alliance
Products and Releases  |  2/18/2010  | 
CA will support the Cloud Security Alliance's initiatives and working groups with identity and access management knowledge
OpenDNS Adds New Web Filtering Feature
Products and Releases  |  2/17/2010  | 
Block Page Bypass allows for individual or department-level filtering settings and bypass functionality
Teens Compete In CyberPatriot II Championships
Products and Releases  |  2/17/2010  | 
Friday's CyberPatriot II is the largest national high school cyber defense competition ever held
TriGeo Unveils its Next Generation SIEM
Products and Releases  |  2/17/2010  | 
TriGeo SIM Version 5.0 is designed specifically for midmarket organizations in financial services, healthcare, government, utility, retail and media/entertainment
Page 1 / 2   >   >>


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Now, we come here to play Paw-ke Man Go!"
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6497
PUBLISHED: 2019-01-20
Hotels_Server through 2018-11-05 has SQL Injection via the controller/fetchpwd.php username parameter.
CVE-2018-18908
PUBLISHED: 2019-01-20
The Sky Go Desktop application 1.0.19-1 through 1.0.23-1 for Windows performs several requests over cleartext HTTP. This makes the data submitted in these requests prone to Man in The Middle (MiTM) attacks, whereby an attacker would be able to obtain the data sent in these requests. Some of the requ...
CVE-2019-6496
PUBLISHED: 2019-01-20
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices allows remote attackers to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of available Wi-Fi networks. Exploitation of the Wi-Fi device can lead to exploitation of...
CVE-2019-3773
PUBLISHED: 2019-01-18
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
CVE-2019-3774
PUBLISHED: 2019-01-18
Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.