Products and Releases

Content posted in February 2010
Page 1 / 2   >   >>
TippingPoint Introduces SSL Security Protection Customized For Data Centers Hosting Web Applications
Products and Releases  |  2/26/2010  | 
TippingPoint 1500S prevents encrypted attacks from compromising Web servers and Web applications
New Mobile VoIP Encryption Announced
Products and Releases  |  2/26/2010  | 
Smartphone Protector now complete with VoiceCrypto
Damballa Launches Realtime Botnet Termination
Products and Releases  |  2/26/2010  | 
Active Threat Termination identifies and stops malicious network activity without disrupting employee productivity or legitimate communications
TippingPoint Introduces New Products To Secure Virtualized Next-Generation Data Centers
Products and Releases  |  2/26/2010  | 
vController provides a data center security solution that addresses challenges of securing both virtual and physical infrastructure
Lumension Unveils Intelligent Application Whitelisting that Operationalizes A Proactive Endpoint Security Approach
Products and Releases  |  2/26/2010  | 
Lumension's Intelligent Whitelisting leverages both blacklisting and whitelisting approaches to deliver a more effective and operational endpoint security solution
Anonymous Browsing, Email Service Launched
Products and Releases  |  2/25/2010  | 
ConnectInPrivate.com offers a five-step suite for guaranteeing privacy online
New Single Sign-On From ActivIdentity
Products and Releases  |  2/25/2010  | 
Offering combines single sign-on password management with a strong authentication platform
FTC Issues Report Of 2009 Top Consumer Complaints
Products and Releases  |  2/24/2010  | 
Federal Trade Commission released a report listing top complaints consumers filed with the agency in 2009
Dasient Introduces Malware Protection Seal For Websites
Products and Releases  |  2/24/2010  | 
Dasient SafeSite seal is the world's first recognized security seal specifically for malware protection
Sophos Offered On Lenovo PCs
Products and Releases  |  2/24/2010  | 
Lenovo will offer Sophos security and data protection technology bundles with new Think-branded PCs
Arxan Launches Application Hardening For Mac Apps
Products and Releases  |  2/24/2010  | 
Extends GuardIT software protection solution to encompass applications targeted for the Mac OS X platform
Courion Upgrades ID And Access Management Solution
Products and Releases  |  2/24/2010  | 
Reduces risk and cost of compliance management by combining identity and access management, sensitive data management, and user activity monitoring
ActivIdentity And idOnDemand Partner For Cloud Security
Products and Releases  |  2/24/2010  | 
idOnDemand will integrate ActivIdentity's ActivID technology to provide a cloud-based system for issuing and managing smart cards
SecuWipe Deletes Data From Stolen Or Lost Windows Phones And Windows CE Terminals
Products and Releases  |  2/24/2010  | 
Latest version from Aiko Solutions offers full approach to protecting user identity and sensitive data in case of mobile phone theft or loss
Guardian Analytics Announces FraudMAP For Business Banking
Products and Releases  |  2/24/2010  | 
Company announces first solution to protect online business banking accounts and prevent fraud from login to logout
Key Pair Technologies Announces Cloud Security And Virtualization Product Family
Products and Releases  |  2/24/2010  | 
Three new solutions address need for increasingly tighter and more integrated security solutions
Centrify Delivers DirectSecure For Next-Generation Protection Of Cross-Platform Systems
Products and Releases  |  2/24/2010  | 
Centrify DirectSecure secures sensitive information by isolating and protecting cross-platform systems and by enabling end-to-end encryption of data in motion
HyTrust Announces $10.5 M In Series B Funding, Adds Cisco And Granite Ventures
Products and Releases  |  2/24/2010  | 
HyTrust will use the capital to drive development, sales, and marketing
Mocapay Unveils Secure Mobile Payments
Products and Releases  |  2/24/2010  | 
Newly patented technology creates single solution to conduct secure mobile transactions in a multichannel environment
3Com Delivers On Secure Network Fabric Strategy With New Solutions For Next-Generation Data Centers
Products and Releases  |  2/24/2010  | 
Four new solutions for large enterprises broadens the Secure Network Fabric in the virtualized data center
Qualys Launches Cloud Computing Solution For FDCC Compliance
Products and Releases  |  2/24/2010  | 
QualysGuard FDCC module helps federal agencies validate the configuration of their desktops according to FDCC regulations
Palo Alto Networks Rolls Out New Next-Generation Firewall Software
Products and Releases  |  2/23/2010  | 
PAN-OS 3.1 software enables finer-grained control over business and Web 2.0 applications for enterprises and distributed computing environments
TippingPoint Rolls Out New IPS For Virtual Environments
Products and Releases  |  2/23/2010  | 
vController provides a comprehensive data center security solution
Melissa Hathaway, John Stewart, Roland Cloutier Join Core's Advisory Board
Products and Releases  |  2/23/2010  | 
Trio will play a significant role in guiding Core's future mission and in achieving those goals
Agiliance Integrates With VeriSign iDefense
Products and Releases  |  2/23/2010  | 
Agiliance Threat and Vulnerability Manager's out-of-the-box integration with VeriSign iDefense Security Intelligence Services provides threat and vulnerability protection
BreakingPoint Announces Major Revenue Growth
Products and Releases  |  2/23/2010  | 
Patent-pending technology provides a scientific method of subjecting cyber-infrastructure elements to hostile and high-stress network conditions in order to measure their resiliency
Petition To Congress On E-Banking Security
Products and Releases  |  2/23/2010  | 
Authentify to ask security pros to get politically active to protect America's SMBs
Rapid7 Announces Exploit Index
Products and Releases  |  2/23/2010  | 
Adds Exploit Exposure to its vulnerability management product, NeXpose
Fasoo To Launch/Demo New Enterprise DRM Solution At RSA
Products and Releases  |  2/23/2010  | 
Fasoo Context-Sensitive DRM scans documents for sensitive information and automatically encrypts them with predefined security policies
Zscaler Publishes 'State of the Web' Report For Q4 2009
Products and Releases  |  2/23/2010  | 
Research details trends and security threats for corporate end users on the Web
Endace Introduces Next Generation, Carrier-Grade Intrusion Detection Solution
Products and Releases  |  2/23/2010  | 
Endace IDS combines multiple critical IT security systems into a single, fully integrated workflow
Rapid7 NeXpose Leverages Metasploit Data, Exploit Database
Products and Releases  |  2/23/2010  | 
Exploit Exposure provides users with deeper insight into the breach paths for vulnerabilities identified across multiple threat vectors
Alert Logic Launches LogReview For PCI
Products and Releases  |  2/22/2010  | 
Using Log Manager, Alert Logic security analysts review log data daily for suspicious activity or security concerns within customer network
Internet Tops 192 Million Domain Name Registrations
Products and Releases  |  2/22/2010  | 
Overall base of .com and .net domain names grew to 96.7 million domain names at the end of 2009
nCircle Announces Patch Priority Index
Products and Releases  |  2/22/2010  | 
Patch Priority Index rankings are based on nCircle's Risk Score
Utah High School Team Wins CyberPatriot II Competition
Products and Releases  |  2/22/2010  | 
Winning team narrowly defeated Team Curry, from Burlington, N.C.
FTC Probe Uncovers Widespread Data Breaches Via P2P Networks
Products and Releases  |  2/22/2010  | 
Close to 100 organizations have been notified that personal data has been shared
SHI And Solutionary Announce Partnership In Managed Security Services
Products and Releases  |  2/22/2010  | 
Solutionary to provide managed security services through SHI's Information Security and Risk Management Practice
Triumfant Issues RSA 2010 Malware Detection Challenge
Products and Releases  |  2/22/2010  | 
Company aims to show how its Resolution Manager solution can detect, analyze and remove all remnants of any malware infection
IBM, Thales Team In Key Management For Storage Encryption
Products and Releases  |  2/22/2010  | 
TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products
IBM, Gemalto Team In Authentication
Products and Releases  |  2/19/2010  | 
Protiva security solution simplifies authentication for users
Trustwave Rolls Out DLP Application
Products and Releases  |  2/19/2010  | 
Scanning application evaluates content risk of identified targets
Comodo Rolls Out Dragon Browser Based On Chromium Project
Products and Releases  |  2/19/2010  | 
Comodo Dragon protects Internet users from inadvertently exposing information about themselves
Fidelis DLP Solution Takes Advantage Of Virtualization
Products and Releases  |  2/19/2010  | 
Rolls out Fidelis Extrusion Prevention System on VMware-based virtual appliances
41st Parameter Expands European Operations
Products and Releases  |  2/19/2010  | 
Also appoints information security veteran David Curran as vice president of its EMEA region
Avecto Releases Privilege Guard 2.5 And Extends Windows 7 UAC Capabilities
Products and Releases  |  2/19/2010  | 
In addition to tighter UAC integration, Privilege Guard 2.5 introduces many new features
CA Joins Cloud Security Alliance
Products and Releases  |  2/18/2010  | 
CA will support the Cloud Security Alliance's initiatives and working groups with identity and access management knowledge
OpenDNS Adds New Web Filtering Feature
Products and Releases  |  2/17/2010  | 
Block Page Bypass allows for individual or department-level filtering settings and bypass functionality
Teens Compete In CyberPatriot II Championships
Products and Releases  |  2/17/2010  | 
Friday's CyberPatriot II is the largest national high school cyber defense competition ever held
TriGeo Unveils its Next Generation SIEM
Products and Releases  |  2/17/2010  | 
TriGeo SIM Version 5.0 is designed specifically for midmarket organizations in financial services, healthcare, government, utility, retail and media/entertainment
Page 1 / 2   >   >>


13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.