Products and Releases

Content posted in February 2010
Page 1 / 2   >   >>
TippingPoint Introduces SSL Security Protection Customized For Data Centers Hosting Web Applications
Products and Releases  |  2/26/2010  | 
TippingPoint 1500S prevents encrypted attacks from compromising Web servers and Web applications
New Mobile VoIP Encryption Announced
Products and Releases  |  2/26/2010  | 
Smartphone Protector now complete with VoiceCrypto
Damballa Launches Realtime Botnet Termination
Products and Releases  |  2/26/2010  | 
Active Threat Termination identifies and stops malicious network activity without disrupting employee productivity or legitimate communications
TippingPoint Introduces New Products To Secure Virtualized Next-Generation Data Centers
Products and Releases  |  2/26/2010  | 
vController provides a data center security solution that addresses challenges of securing both virtual and physical infrastructure
Lumension Unveils Intelligent Application Whitelisting that Operationalizes A Proactive Endpoint Security Approach
Products and Releases  |  2/26/2010  | 
Lumension's Intelligent Whitelisting leverages both blacklisting and whitelisting approaches to deliver a more effective and operational endpoint security solution
Anonymous Browsing, Email Service Launched
Products and Releases  |  2/25/2010  | 
ConnectInPrivate.com offers a five-step suite for guaranteeing privacy online
New Single Sign-On From ActivIdentity
Products and Releases  |  2/25/2010  | 
Offering combines single sign-on password management with a strong authentication platform
FTC Issues Report Of 2009 Top Consumer Complaints
Products and Releases  |  2/24/2010  | 
Federal Trade Commission released a report listing top complaints consumers filed with the agency in 2009
Dasient Introduces Malware Protection Seal For Websites
Products and Releases  |  2/24/2010  | 
Dasient SafeSite seal is the world's first recognized security seal specifically for malware protection
Sophos Offered On Lenovo PCs
Products and Releases  |  2/24/2010  | 
Lenovo will offer Sophos security and data protection technology bundles with new Think-branded PCs
Arxan Launches Application Hardening For Mac Apps
Products and Releases  |  2/24/2010  | 
Extends GuardIT software protection solution to encompass applications targeted for the Mac OS X platform
Courion Upgrades ID And Access Management Solution
Products and Releases  |  2/24/2010  | 
Reduces risk and cost of compliance management by combining identity and access management, sensitive data management, and user activity monitoring
ActivIdentity And idOnDemand Partner For Cloud Security
Products and Releases  |  2/24/2010  | 
idOnDemand will integrate ActivIdentity's ActivID technology to provide a cloud-based system for issuing and managing smart cards
SecuWipe Deletes Data From Stolen Or Lost Windows Phones And Windows CE Terminals
Products and Releases  |  2/24/2010  | 
Latest version from Aiko Solutions offers full approach to protecting user identity and sensitive data in case of mobile phone theft or loss
Guardian Analytics Announces FraudMAP For Business Banking
Products and Releases  |  2/24/2010  | 
Company announces first solution to protect online business banking accounts and prevent fraud from login to logout
Key Pair Technologies Announces Cloud Security And Virtualization Product Family
Products and Releases  |  2/24/2010  | 
Three new solutions address need for increasingly tighter and more integrated security solutions
Centrify Delivers DirectSecure For Next-Generation Protection Of Cross-Platform Systems
Products and Releases  |  2/24/2010  | 
Centrify DirectSecure secures sensitive information by isolating and protecting cross-platform systems and by enabling end-to-end encryption of data in motion
HyTrust Announces $10.5 M In Series B Funding, Adds Cisco And Granite Ventures
Products and Releases  |  2/24/2010  | 
HyTrust will use the capital to drive development, sales, and marketing
Mocapay Unveils Secure Mobile Payments
Products and Releases  |  2/24/2010  | 
Newly patented technology creates single solution to conduct secure mobile transactions in a multichannel environment
3Com Delivers On Secure Network Fabric Strategy With New Solutions For Next-Generation Data Centers
Products and Releases  |  2/24/2010  | 
Four new solutions for large enterprises broadens the Secure Network Fabric in the virtualized data center
Qualys Launches Cloud Computing Solution For FDCC Compliance
Products and Releases  |  2/24/2010  | 
QualysGuard FDCC module helps federal agencies validate the configuration of their desktops according to FDCC regulations
Palo Alto Networks Rolls Out New Next-Generation Firewall Software
Products and Releases  |  2/23/2010  | 
PAN-OS 3.1 software enables finer-grained control over business and Web 2.0 applications for enterprises and distributed computing environments
TippingPoint Rolls Out New IPS For Virtual Environments
Products and Releases  |  2/23/2010  | 
vController provides a comprehensive data center security solution
Melissa Hathaway, John Stewart, Roland Cloutier Join Core's Advisory Board
Products and Releases  |  2/23/2010  | 
Trio will play a significant role in guiding Core's future mission and in achieving those goals
Agiliance Integrates With VeriSign iDefense
Products and Releases  |  2/23/2010  | 
Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides threat and vulnerability protection
BreakingPoint Announces Major Revenue Growth
Products and Releases  |  2/23/2010  | 
Patent-pending technology provides a scientific method of subjecting cyber-infrastructure elements to hostile and high-stress network conditions in order to measure their resiliency
Petition To Congress On E-Banking Security
Products and Releases  |  2/23/2010  | 
Authentify to ask security pros to get politically active to protect America's SMBs
Rapid7 Announces Exploit Index
Products and Releases  |  2/23/2010  | 
Adds Exploit Exposure to its vulnerability management product, NeXpose
Fasoo To Launch/Demo New Enterprise DRM Solution At RSA
Products and Releases  |  2/23/2010  | 
Fasoo Context-Sensitive DRM scans documents for sensitive information and automatically encrypts them with predefined security policies
Zscaler Publishes 'State of the Web' Report For Q4 2009
Products and Releases  |  2/23/2010  | 
Research details trends and security threats for corporate end users on the Web
Endace Introduces Next Generation, Carrier-Grade Intrusion Detection Solution
Products and Releases  |  2/23/2010  | 
Endace IDS combines multiple critical IT security systems into a single, fully integrated workflow
Rapid7 NeXpose Leverages Metasploit Data, Exploit Database
Products and Releases  |  2/23/2010  | 
Exploit Exposure provides users with deeper insight into the breach paths for vulnerabilities identified across multiple threat vectors
Alert Logic Launches LogReview For PCI
Products and Releases  |  2/22/2010  | 
Using Log Manager, Alert Logic security analysts review log data daily for suspicious activity or security concerns within customer network
Internet Tops 192 Million Domain Name Registrations
Products and Releases  |  2/22/2010  | 
Overall base of .com and .net domain names grew to 96.7 million domain names at the end of 2009
nCircle Announces Patch Priority Index
Products and Releases  |  2/22/2010  | 
Patch Priority Index rankings are based on nCircle's Risk Score
Utah High School Team Wins CyberPatriot II Competition
Products and Releases  |  2/22/2010  | 
Winning team narrowly defeated Team Curry, from Burlington, N.C.
FTC Probe Uncovers Widespread Data Breaches Via P2P Networks
Products and Releases  |  2/22/2010  | 
Close to 100 organizations have been notified that personal data has been shared
SHI And Solutionary Announce Partnership In Managed Security Services
Products and Releases  |  2/22/2010  | 
Solutionary to provide managed security services through SHI's Information Security and Risk Management Practice
Triumfant Issues RSA 2010 Malware Detection Challenge
Products and Releases  |  2/22/2010  | 
Company aims to show how its Resolution Manager solution can detect, analyze and remove all remnants of any malware infection
IBM, Thales Team In Key Management For Storage Encryption
Products and Releases  |  2/22/2010  | 
TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products
IBM, Gemalto Team In Authentication
Products and Releases  |  2/19/2010  | 
Protiva security solution simplifies authentication for users
Trustwave Rolls Out DLP Application
Products and Releases  |  2/19/2010  | 
Scanning application evaluates content risk of identified targets
Comodo Rolls Out Dragon Browser Based On Chromium Project
Products and Releases  |  2/19/2010  | 
Comodo Dragon protects Internet users from inadvertently exposing information about themselves
Fidelis DLP Solution Takes Advantage Of Virtualization
Products and Releases  |  2/19/2010  | 
Rolls out Fidelis Extrusion Prevention System on VMware-based virtual appliances
41st Parameter Expands European Operations
Products and Releases  |  2/19/2010  | 
Also appoints information security veteran David Curran as vice president of its EMEA region
Avecto Releases Privilege Guard 2.5 And Extends Windows 7 UAC Capabilities
Products and Releases  |  2/19/2010  | 
In addition to tighter UAC integration, Privilege Guard 2.5 introduces many new features
CA Joins Cloud Security Alliance
Products and Releases  |  2/18/2010  | 
CA will support the Cloud Security Alliance's initiatives and working groups with identity and access management knowledge
OpenDNS Adds New Web Filtering Feature
Products and Releases  |  2/17/2010  | 
Block Page Bypass allows for individual or department-level filtering settings and bypass functionality
Teens Compete In CyberPatriot II Championships
Products and Releases  |  2/17/2010  | 
Friday's CyberPatriot II is the largest national high school cyber defense competition ever held
TriGeo Unveils its Next Generation SIEM
Products and Releases  |  2/17/2010  | 
TriGeo SIM Version 5.0 is designed specifically for midmarket organizations in financial services, healthcare, government, utility, retail and media/entertainment
Page 1 / 2   >   >>


Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6970
PUBLISHED: 2018-08-13
VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privil...
CVE-2018-14781
PUBLISHED: 2018-08-13
Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolu...
CVE-2018-15123
PUBLISHED: 2018-08-13
Insecure configuration storage in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows remote attacker perform new attack vectors and take under control device and smart home.
CVE-2018-15124
PUBLISHED: 2018-08-13
Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.
CVE-2018-15125
PUBLISHED: 2018-08-13
Sensitive Information Disclosure in Zipato Zipabox Smart Home Controller allows remote attacker get sensitive information that expands attack surface.