Outback supermarket chain deploys secure two-way satellite services
12 March, 2012Outback Stores is a company that manages remote stores on behalf of Australian Indigenous communities in the Northern Territory, Western Australia and South Australia. The company has deployed network and security solutions to securely connect its many remote locations.
Thales nShield HSM integrated with Infoblox DNS
14 February, 2012The Thales nShield hardware security module (HSM) has been integrated with the Infoblox DNS platform to address common DNSSEC deployment challenges and enable service providers, government departments, financial institutions and other organisations to secure their online identities more easily and protect critical services against cyberthreats.
50 ‘hacktivist’ amateur DDoS tools analysed
08 February, 2012Network security vendor Arbor Networks has published a visual review of DDoS tools that are used by ‘hacktivist’ collectives - groups that hack into computers and organisations as a form of political protest.
Check Point cloud-based software blades
17 January, 2012Check Point Software Technologies’ security gateways are available through Amazon Web Services. Organisations can apply the same level of security and control to their public cloud network as they have to their traditional networks, extending their security to the cloud with over 30 software blade protections, including firewall, IPS, virtual private network (VPN), application control, URL filtering, mobile access and data loss prevention (DLP).
Grace Christian School deploys web filtering solution
19 December, 2011Grace Christian School has deployed a web filtering and anonymous proxy prevention solution, providing its students and staff with a safer and more secure IT environment.
ComNet CWGE2FE24MODMS 26-port modular gigabit ethernet switch
19 September, 2011 byComNet has introduced a 26-port modular gigabit ethernet switch for commercial security applications.
Inside the Platform Networks hacking attack
01 August, 2011 by Andrew CollinsPlatform Networks, Australian telco wholesaler and NBN affiliate, last week revealed it had been on the receiving end of a six-month-long hacking attack. Andrew Collins talks to Platform’s managing director, David Hooton, about the disclosure of information on the incident to the Australian Federal Police, and a forthcoming case study on the attack and the company’s defence against it.
NBN "not hacked" in Platform Networks attack, says NBN Co
28 July, 2011NBN Co has denied that its systems were compromised during the attack on its partner Platform Networks that was revealed earlier this week.
Brennan IT SecureView real-time network security
11 July, 2011 byArbor Networks and Brennan IT have partnered to deliver the SecureView service that can be used to enhance security on private IP networks.
Wireless security considerations
07 June, 2011With the continuing proliferation of WLANs, network administrators have some tough choices to make when it comes to securing these wireless networks. Hemant Chaskar*, Director of Technology at AirTight Networks, takes a closer look at these decisions.
F5 Networks BIG-IP Global Traffic Manager (GTM)
16 May, 2011 byThe F5 Networks BIG-IP Global Traffic Manager (GTM) helps users deploy domain name system security extensions (DNSSEC) protection for newly signed .com and other internet domain types.
M86 Security Web Filtering And Reporting Suite (WFR) version 4.1 with M86 VuSafe
11 May, 2011 byThe M86 Web Filtering And Reporting Suite (WFR) version 4.1 integrates the M86 VuSafe service for schools. M86 VuSafe is an easy-to-use, secure video library enabling educators to find, tag, organise and share online videos from YouTube without showing inappropriate videos, advertisements, viewer comments or outside links. VuSafe is free to WFR users.
ProSecure UTM150 unified threat management appliance
27 April, 2011The ProSecure UTM150 unified threat management appliance can be used for data security for users adopting the cloud. With Stream Scanning technology, the appliance uses virus and malware threat databases from ProSecure and Sophos that are up to a claimed 400 times more comprehensive than legacy all-in-one platforms, at a speed that is up to a claimed five times faster than conventional methods.
Kaspersky Lab security software
14 March, 2011 byKaspersky Lab products, Endpoint Security 8 for Mac, Endpoint Security 8 for Linux and Kaspersky Endpoint Security 8 for Smartphones, are designed to protect against IT security threats.
NXP Semiconductors/Giesecke & Devrient NFC mobile devices secure interface software
14 March, 2011 byNXP Semiconductors and Giesecke & Devrient’s joint software solution offers secure interfaces between the handset, NFC functionality and secure elements such as the SIM card. This solution enables NFC to be integrated securely into mobile handsets based on the Android platform and other operating systems. In addition, the validated software will meet the needs of mobile network operators who require secure elements within the handset.