Arbor Networks and Brennan IT have partnered to deliver the SecureView service that can be used to enhance security on private IP networks.
With the continuing proliferation of WLANs, network administrators have some tough choices to make when it comes to securing these wireless networks. Hemant Chaskar*, Director of Technology at AirTight Networks, takes a closer look at these decisions.
The F5 Networks BIG-IP Global Traffic Manager (GTM) helps users deploy domain name system security extensions (DNSSEC) protection for newly signed .com and other internet domain types.
The M86 Web Filtering And Reporting Suite (WFR) version 4.1 integrates the M86 VuSafe service for schools. M86 VuSafe is an easy-to-use, secure video library enabling educators to find, tag, organise and share online videos from YouTube without showing inappropriate videos, advertisements, viewer comments or outside links. VuSafe is free to WFR users.
The ProSecure UTM150 unified threat management appliance can be used for data security for users adopting the cloud. With Stream Scanning technology, the appliance uses virus and malware threat databases from ProSecure and Sophos that are up to a claimed 400 times more comprehensive than legacy all-in-one platforms, at a speed that is up to a claimed five times faster than conventional methods.
Kaspersky Lab products, Endpoint Security 8 for Mac, Endpoint Security 8 for Linux and Kaspersky Endpoint Security 8 for Smartphones, are designed to protect against IT security threats.
NXP Semiconductors and Giesecke & Devrient’s joint software solution offers secure interfaces between the handset, NFC functionality and secure elements such as the SIM card. This solution enables NFC to be integrated securely into mobile handsets based on the Android platform and other operating systems. In addition, the validated software will meet the needs of mobile network operators who require secure elements within the handset.
SecureTransport simplifies and secures file transfers between people, sites, applications and external partners, providing visibility into information flows both within and outside of the organisation, while ensuring compliance with global mandates.
Tom Heiser has been named as President of RSA, the security division of EMC.
The not-for-profit Royal Flying Doctor Service Western Operations (RFDSWO) provides a 24-hour health lifeline for people living, working or travelling in rural and remote areas of Western Australia and the Indian Ocean Territories.
According to internet security company AVG Technologies, web surfers in Turkey, Russia, Armenia and Azerbaijan are the most likely to face threats while online. The safest countries seem to be Sierra Leone and Japan.
At a recent roundtable in Sydney, Scott Totzke, Security VP for Research In Motion (RIM), discussed the need for smartphone vendors to simplify security to improve usability for end users, the need to build security in from the start of the production cycle to maximise the efficiency of mobile devices and how trust is essential for the future development of mobility.
Parade College is a dual campus Catholic boys school which since 1871 has sought innovative, creative and effective ways of achieving best practice teaching and learning. Protecting a network that is used by close to 2000 students and teachers is not a job for the faint-hearted. Parade College has a network with over 720 personal computers for the use of students, 270 personal computers for teachers and a suite of ‘e-rooms’ or shared spaces containing computers within a cluster of classrooms. Underpinning the IT strategy is a program to continuously evaluate and deploy new technologies to strengthen the security of its network.
Protecting an IT environment now consumes more resources than actually managing the network. There are more devices connected, more people collaborating, more dispersal of access points and an enormous increase in the amount of traffic and type of traffic on the network. Juniper Networks’ Matt Miller looks at the following issues and provides some remedies. Even if you can secure all entry points, the biggest issue is scale. How do you ensure only the right people can see the right data at the right time when network capacity is already strained?
SecureScreen utilises global in-the-cloud infrastructure to enforce and maintain comprehensive information security and corporate policy. With no hardware or software to install, near-zero latency and an invisible footprint, it is cost effective and is claimed to be a most complete, flexible, comprehensive network security system in its class.