Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Products and Releases

Content posted in June 2009
<<   <   Page 2 / 3   >   >>
TrustPort Adds New Features To Firewall
Products and Releases  |  6/18/2009  | 
TrustPort PC Security includes an improved shredding tool and more extensive support of 64-bit operating systems
AirMagnet Rolls Out New Policy Library For AirMagnet Enterprise
Products and Releases  |  6/18/2009  | 
New policies let users to integrate best practices and design guides for voice deployments and ongoing management and security of WLANs
ManageEngine Adds USB Device Management
Products and Releases  |  6/18/2009  | 
New features to Desktop Central help admins better manage desktop security and compliance
Overland Storage Inks Agreement With Synnex For Delivery End-to-End Data Protection Solutions
Products and Releases  |  6/18/2009  | 
Synnex will add Overland's complete line of storage and data protection appliances to its suite of solutions
Panda Security Launches New UTM Appliance For SMBs
Products and Releases  |  6/17/2009  | 
Updated Panda GateDefender Integra includes new model for companies with as few as 50 employees
Cenzic Enhances Web Security Tools For The Cloud
Products and Releases  |  6/17/2009  | 
Company announces 6.0 release of ClickToSecure and Cenzic Hailstorm Enterprise ARC offerings
Vigilant Rolls Out Fusion for SIEM Managed Security Service
Products and Releases  |  6/17/2009  | 
Service includes an assessment of the customer's existing SIEM solution to determine how well it meets key security program and IT risk management requirements
Echoworx Launches Enhanced Policy-Based End Point Encryption
Products and Releases  |  6/17/2009  | 
Encrypted Documents prevents data loss on the network, laptop, or on a USB key
Finjan Releases "Cybercrime Intelligence Report"
Products and Releases  |  6/17/2009  | 
Compromised PCs of individuals and corporations are turned into digital assets that cybercriminals potentially trade online, according to report
Wendy's Franchisee Adds Biometric Tech From DigitalPersona
Products and Releases  |  6/17/2009  | 
Tar Heel Capital, the largest Wendy's restaurant franchisee, chooses DigitalPersona fingerprint readers with WAND Point-of-Sale software on its POS terminals
Kantara Initiative Launches To Address Global Identity Landscape
Products and Releases  |  6/17/2009  | 
Organization will work on harmonization and interoperability challenges that exist among identity-enabled enterprise, Web 2.0, and Web-based applications and services
Heartland Payment Systems Selects Voltage Security For Encryption Solution
Products and Releases  |  6/17/2009  | 
Voltage SecureData product line will power the software component of Heartland's end-to-end encryption (E3) software
CyberPatrol Upgrades SiteSURVCloud Web Filtering Solution For SMBs
Products and Releases  |  6/17/2009  | 
SiteSURV 4.0 now allows user to select categories to be blocked or allowed from the database of 44 total categories
InternetSafety.com Supplies Web Filtering Technology For McAfee Family Protection
Products and Releases  |  6/17/2009  | 
Software protects children from exposure to inappropriate content, social networking risks, other threats
Quest, Intellitactics Parter On Managed Security Services
Products and Releases  |  6/17/2009  | 
Quest will locate the Intellitactics SAFE appliance on the client's premise, and provide remote expertise to monitor logs and analyze security events for compliance and threat management
Survey: Majority Of European Offices Not Protecting Confidential Printed Data
Products and Releases  |  6/17/2009  | 
According to Samsung's research, 56 percent of workers regularly see confidential documents abandoned on the printer, 51 percent not aware of any processes or technologies in place at their organization to protect the printer network itself
HP To Resell Secure64 DNSSEC Software
Products and Releases  |  6/16/2009  | 
Secure64 products, which run on entry-class HP Integrity rx2660 and rx3600 servers, address DNS vulnerabilities
NeuStar Rolls Out Cache Defender DNS Authentication System
Products and Releases  |  6/16/2009  | 
Cache Defender deploys proprietary NeuStar appliances both in the core of an ISP network and at each node of NeuStar's UltraDNS Directory Services Platform
Oberthur/id3 Fingerprint On-Card Comparison Biometrics Meets NIST Criteria
Products and Releases  |  6/15/2009  | 
Oberthur/id3 algorithm gets thumbs up for interoperability, accuracy, and speed, while maintaining an error rate lower than the thresholds defined in the US government's PIV program
Cymtec Systems Posts 35% Sales Increase In Q1 2009
Products and Releases  |  6/15/2009  | 
Company credits increase to record sales of Cymtec Sentry, its flagship network optimization and visibility appliance for remote and branch office environments
Astaro To Bolster Security Gateway With Customer-Requested Features
Products and Releases  |  6/15/2009  | 
Suggestions include real-time bandwidth monitoring, increased IPS performance on multicore installations and captive portal
New Reference Model Addresses Supply Chain Security
Products and Releases  |  6/15/2009  | 
White paper from SAIC and the Supply Chain Management Center addresses the challenge of keeping distributed, global networks secure from threats with a well-defined and integrated model built upon a dynamic governance structure that unites hardware and software planning
RedSeal Systems Launches RedSeal Network Advisor 4.0 Network Security Assurance Software
Products and Releases  |  6/15/2009  | 
RedSeal Network Advisor continuously analyzes end-to-end interaction of firewalls, routers, and load balancers throughout an organization to identify security holes
Novell Announces Novell Compliance Management Platform Extension For SAP Environments
Products and Releases  |  6/15/2009  | 
With Novell provisioning capabilities, customers can integrate the identity and security information in their SAP solutions with other business applications
SuccessFactors Adopts Integrated Cloud Security Solution
Products and Releases  |  6/15/2009  | 
Company adds new security standards powered by WhiteHat's Website Vulnerability Management and Imperva's SecureSphere Web Application Firewall
Survey: Many Large Enterprises Underestimate Risk From Terminated Employees
Products and Releases  |  6/15/2009  | 
93% of large enterprise IT admins say there is no risk from former employees, yet more than half have limited knowledge of employee access rights to systems
Busted: International Telephone Hacking Conspiracy
Products and Releases  |  6/12/2009  | 
Indictment unsealed against three individuals who allegedly hacked into the telephone systems of large corporations and entities in the United States and abroad and sold information to Pakistani nationals
Entrust Board Summarizes Acquisition By Thoma Bravo
Products and Releases  |  6/12/2009  | 
Entrust board reaffirms its view that merger with Thoma Bravo is fair and in the best interests of Entrust and its stockholders
Qualys Selects TriCipher Solution For On-Demand Secure Single Sign-On
Products and Releases  |  6/12/2009  | 
Security SaaS leader selects myOneLogin to protect and simplify access to Web-based applications
Discretix Adds Digital Rights Management To Intel-Based Mobile Devices
Products and Releases  |  6/12/2009  | 
DRM solution features Discretix' Multi-Scheme DRM client, which has been optimized for Intel's second-generation MID platform and Linux-based Moblin OS
GWEBS Announces MailCloak SMB Encryption Solutions
Products and Releases  |  6/11/2009  | 
MailCloak SMB and MailCloak PRO email encryption products protect individual email messages with open-source algorithms to scramble message, attachment, and draft content
Lieberman Software Adds RSA SecurID Authentication
Products and Releases  |  6/11/2009  | 
Account Reset Console 5.0 offers protection for sensitive user account passwords, plus enterprise performance and scalability
Intellitactics Releases ClientVue MSSP
Products and Releases  |  6/11/2009  | 
ClientVue dashboard enables managed security service providers to provide clients with controlled access to information about their security infrastructure
Fortify Software, HP Collaborate On Application Life Cycle Security Solutions
Products and Releases  |  6/11/2009  | 
Fortify 360's Static Application Security Testing (SAST) technology will be integrated with HP Application Security Center and HP Quality Center software solutions to give enterprise users increased visibility into applications
PSP Completes SAS 70 Type 1 Audit
Products and Releases  |  6/11/2009  | 
Audit of Web hosting and Internet solutions company included its server monitoring, security, and support service practices
Former CIA CTO Joins Triumfant's Advisory Board
Products and Releases  |  6/11/2009  | 
Bob Flores also founded Applicology, an independent consulting firm specializing in IT and cybersecurity issues
Guthy-Renker Invests $2 Million In CyberDefender
Products and Releases  |  6/11/2009  | 
Equity investment will go toward CyberDefender advertising, customer service, enhanced ecommerce platform, and hiring of key staff
nCircle, HITRUST Announce SaaS For Healthcare Organizations
Products and Releases  |  6/10/2009  | 
nCircle Suite360 vulnerability and configuration scanning service helps healthcare organizations improve security
StrongWebmail.com Congratulates Hacker For Winning Its Challenge
Products and Releases  |  6/10/2009  | 
XSS script took advantage of a vulnerability in company's Webmail program; hackers win $10K
Layer 7 Brings Governance To The Cloud
Products and Releases  |  6/10/2009  | 
Layer 7 SecureSpan Virtual Appliance lets organizations secure cloud-based interactions, monitor service-level conformance
Entrust Reduces Price For EV SSL Certificates
Products and Releases  |  6/10/2009  | 
Extended Validation refers to rigorous, industry-standard validation methods now used by certification authorities before issuing an SSL certificate
AIT Offers Free Domain Name With Purchase Of Antispam Service Plan
Products and Releases  |  6/10/2009  | 
Anti-Spam Pro cloud-based service provides protection against email-borne threats
Cigital, Security Innovation Partner On Security Software
Products and Releases  |  6/10/2009  | 
Integrated offering reduces organizational risk and improves software quality
Online Dating Service eHarmony Implements Accertify's Fraud-Fighting Technology
Products and Releases  |  6/10/2009  | 
Interceptas platform provides fraud-fighting tools and components in a single system that allows merchants to integrate more data into the fraud-fighting process
Microsoft Joins Global Aerospace & Defense Industry Security Group
Products and Releases  |  6/10/2009  | 
Transglobal Secure Collaboration Program (TSCP) focuses on mitigating the compliance, complexity, cost, and IT security risks inherent in large-scale, multinational collaborative programs
Survey: Parents Clueless About Their Kids' Online Safety Over The Summer
Products and Releases  |  6/9/2009  | 
With more kids staying at home this summer, parents may want to reconsider how they plan on monitoring their kids' online behavior, according to a Trend Micro survey
RSA: Growing Security Risks As Businesses Adopt Emerging Web, Mobile Technologies
Products and Releases  |  6/9/2009  | 
More than 80 percent of security leaders surveyed say risks are being overlooked as cost and revenue pressure rises
Study: Most Creditworthy Consumers Also Are Most Likely to Be Identity Theft Victim
Products and Releases  |  6/9/2009  | 
Experian study finds significant relationship between high credit scores and propensity for identity fraud victimization
DNS Security Webinar: Issues And Challenges
Products and Releases  |  6/8/2009  | 
On June 10 presenters will share their perspectives on the latest DNS security issues and challenges, as well as DNSSEC and where it fits within an overall DNS security framework
Palo Alto Networks Announces PAN-OS 3.0 Firewall OS
Products and Releases  |  6/8/2009  | 
PAN-OS 3.0 includes QoS features and a fully integrated SSL VPN to help enterprise customers embrace new applications
<<   <   Page 2 / 3   >   >>

COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/3/2020
Data Loss Spikes Under COVID-19 Lockdowns
Seth Rosenblatt, Contributing Writer,  5/28/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-04
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TL...
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
PUBLISHED: 2020-06-04
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicyelements.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.