Fortinet has published its June 2010 Threat Landscape report which showed that new variations of the Sasfis botnet have entered the malware Top 10 list.
Parade College is a dual campus Catholic boys school which since 1871 has sought innovative, creative and effective ways of achieving best practice teaching and learning. Protecting a network that is used by close to 2000 students and teachers is not a job for the faint-hearted. Parade College has a network with over 720 personal computers for the use of students, 270 personal computers for teachers and a suite of ‘e-rooms’ or shared spaces containing computers within a cluster of classrooms. Underpinning the IT strategy is a program to continuously evaluate and deploy new technologies to strengthen the security of its network.
In response to the growing number of enterprise security threats, Symantec has announced four products as part of its enterprise security portfolio strategy to develop and enforce IT policies, protect information, manage systems and protect infrastructure.
The updated version of the MailGate security appliance offers expanded security and compliance functionality and improved ease of use. Features include enterprise multi-tenancy, support for IPv6 and additional capabilities for digital rights management, providing inbound threat protection, outbound data loss prevention and archiving capabilities.
Websense has announced the Web Security Gateway Anywhere, a secure web gateway with threat and risk prevention and deployment capabilities, part of the Triton system.
Protecting an IT environment now consumes more resources than actually managing the network. There are more devices connected, more people collaborating, more dispersal of access points and an enormous increase in the amount of traffic and type of traffic on the network. Juniper Networks’ Matt Miller looks at the following issues and provides some remedies. Even if you can secure all entry points, the biggest issue is scale. How do you ensure only the right people can see the right data at the right time when network capacity is already strained?
A survey indicates increased awareness of online threats and continued wariness when interacting with online sites.
Email Security Threat Brief for the month of March 2010 highlights the monthly email trends from Websense Security Labs.
The McAfee data loss prevention (DLP) solution can be used to address concerns about the security of regulated data and sensitive information. Its data loss prevention technology includes a common policy across all components, database crawling, easier workflow through the ePolicy Orchestrator platform and improved support for Microsoft Active Directory.
SecureScreen utilises global in-the-cloud infrastructure to enforce and maintain comprehensive information security and corporate policy. With no hardware or software to install, near-zero latency and an invisible footprint, it is cost effective and is claimed to be a most complete, flexible, comprehensive network security system in its class.
Symantec has announced web security monitoring, a managed security service designed to allow users to protect their end users and online web presence from pervasive web threats.
Imperva and Cyveillance have announced a partnership to shield organisations against growing phishing attacks. Under the agreement, Imperva integrated the Cyveillance Anti-Phishing Data Feed as part of its ThreatRadar service to enhance its SecureSphere web application firewall, enabling enterprises to deploy comprehensive reputation-based security through proactive detection of phishing threats before they become a problem.
Three Coca-Cola employees were charged with stealing confidential information and samples of a new drink in the hope of selling them to competitor PepsiCo. Information is the lifeblood of the company. Carlo Minassian knows this only too well as he is charged with the security of many companies’ data.
A scant decade ago, packet-filter firewalls were sufficient to protect against virtually all threats coming from the internet. Today, however, the number, variety and sophistication of threats against business networks have multiplied, and firewalls and antivirus software on desktops are no longer sufficient. This has led to the evolution of unified threat management (UTM) solutions, reports Fortinet’s Richard Stiennon.
A Blue Coat Systems report has examined evolving malware attack strategies that exploit online user behaviour.