Symantec software monitors sensitive Apple iOS iPhone, iPad e-mail
Symantec today said the updated version of its Data Loss Prevention (DLP) suite will be able to monitor confidential data sent by e-mail via Apple iPhones and iPads.
Symantec today said the updated version of its Data Loss Prevention (DLP) suite will be able to monitor confidential data sent by e-mail via Apple iPhones and iPads.
Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers.
A Gartner report about the security software market shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot with 19.6 per cent of the $US19.1 billion market.
To protect the federal civilian agencies against cyberthreats, the Department of Homeland Security (DHS) is preparing to deploy a more powerful version of its EINSTEIN intrusion-detection system that’s supposed to detect attacks and malware, especially associated with e-mail. But since this version of EINSTEIN is acknowledged by DHS to be able to read electronic content, it’s raising privacy concerns.
RSA, the security division of EMC, today announced Security Analytics, its tool for real-time analysis of large amounts of data from security and business information to determine if an organization is being attacked, especially by stealthy threats intent on stealing sensitive information.
An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network traffic it can shut down attacks, typically by blocking access from the attacker or blocking access to the target. In some cases, the IPS can talk to the firewall to block an attack.
Network downtime is an inescapable fact for networks of all sizes, and all the prevention and detection tools in the world won't allow analysts to quickly solve the problem. What's needed are tools that will pinpoint the root cause of the problem and determine the appropriate steps to solve it. This isn't to say that protection and detection tools aren't necessary. Obviously they are an important part of overall network health, but they should be a part of the solution, not THE solution.
Any enterprise looking to use cloud computing services will also be digging into what laws and regulations might hold in terms of security and privacy of data stored in the cloud. At the Cloud Security Alliance Congress in Orlando this week, discussion centered on two important regulatory frameworks now being put in place in Europe and the U.S.
Tablet yang mana yang harus saya beli? Perbandingan antara iPad 2 dan Sony Tablet S
Sourcefire Monday announced a new line of intrusion-prevention systems (IPS) that sets the foundation for the company's anticipated foray into the application-aware next-generation firewall market later this year.
Sourcefire today announced it has acquired start-up Immunet for $21 million, including $17 million paid at closing and $4 million expected to be paid over the next 18 months upon “achievement of product-delivery milestones related to the enterprise version of Immunet’s product.”
Cisco today announced a multi-function security appliance that combines a firewall with VPN support, plus an intrusion-prevention system (IPS), to reach speeds up to 20 Gbps with 10,000 VPN connections and 350,000 connections per second. Apple posts Cisco’s iPhone AnyConnect iPhone SSLVPN client to the App Store.
Emerging Threats Pro debuted Monday with a rival intrusion detection and prevention signature technology to vendor Sourcefire, which shepherds open source Snort and its threat-detection signature base.
Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats.
The U.S. military wants to exert more influence over the protection of power grids, transportation networks and financial network systems, a Pentagon official says in a broad-ranging essay published in Foreign Affairs.