Hit-and-run attack one of the top security threats in June

05 July, 2010

Fortinet has published its June 2010 Threat Landscape report which showed that new variations of the Sasfis botnet have entered the malware Top 10 list.

Set-and-forget network security for Parade College

28 June, 2010

Parade College is a dual campus Catholic boys school which since 1871 has sought innovative, creative and effective ways of achieving best practice teaching and learning. Protecting a network that is used by close to 2000 students and teachers is not a job for the faint-hearted. Parade College has a network with over 720 personal computers for the use of students, 270 personal computers for teachers and a suite of ‘e-rooms’ or shared spaces containing computers within a cluster of classrooms. Underpinning the IT strategy is a program to continuously evaluate and deploy new technologies to strengthen the security of its network.

Symantec enterprise security portfolio

09 June, 2010

In response to the growing number of enterprise security threats, Symantec has announced four products as part of its enterprise security portfolio strategy to develop and enforce IT policies, protect information, manage systems and protect infrastructure.

Axway MailGate security appliance

09 June, 2010

The updated version of the MailGate security appliance offers expanded security and compliance functionality and improved ease of use. Features include enterprise multi-tenancy, support for IPv6 and additional capabilities for digital rights management, providing inbound threat protection, outbound data loss prevention and archiving capabilities.

Websense Web Security Gateway Anywhere

18 May, 2010

Websense has announced the Web Security Gateway Anywhere, a secure web gateway with threat and risk prevention and deployment capabilities, part of the Triton system.

Is unified access control the answer to security?

11 May, 2010

Protecting an IT environment now consumes more resources than actually managing the network. There are more devices connected, more people collaborating, more dispersal of access points and an enormous increase in the amount of traffic and type of traffic on the network. Juniper Networks’ Matt Miller looks at the following issues and provides some remedies. Even if you can secure all entry points, the biggest issue is scale. How do you ensure only the right people can see the right data at the right time when network capacity is already strained?

Survey finds increased awareness of online threats

03 May, 2010

A survey indicates increased awareness of online threats and continued wariness when interacting with online sites.

No let-up in email threat landscape

30 April, 2010

Email Security Threat Brief for the month of March 2010 highlights the monthly email trends from Websense Security Labs.

McAfee data loss prevention solution

13 April, 2010

The McAfee data loss prevention (DLP) solution can be used to address concerns about the security of regulated data and sensitive information. Its data loss prevention technology includes a common policy across all components, database crawling, easier workflow through the ePolicy Orchestrator platform and improved support for Microsoft Active Directory.

Seccom Global SecureScreen cloud security system

13 April, 2010

SecureScreen utilises global in-the-cloud infrastructure to enforce and maintain comprehensive information security and corporate policy. With no hardware or software to install, near-zero latency and an invisible footprint, it is cost effective and is claimed to be a most complete, flexible, comprehensive network security system in its class.

Symantec web security monitoring

13 April, 2010

Symantec has announced web security monitoring, a managed security service designed to allow users to protect their end users and online web presence from pervasive web threats.

Imperva ThreatRadar with Cyveillance Anti-Phishing Data Feed

12 April, 2010

Imperva and Cyveillance have announced a partnership to shield organisations against growing phishing attacks. Under the agreement, Imperva integrated the Cyveillance Anti-Phishing Data Feed as part of its ThreatRadar service to enhance its SecureSphere web application firewall, enabling enterprises to deploy comprehensive reputation-based security through proactive detection of phishing threats before they become a problem.

Inside the insider

01 April, 2010

Three Coca-Cola employees were charged with stealing confidential information and samples of a new drink in the hope of selling them to competitor PepsiCo. Information is the lifeblood of the company. Carlo Minassian knows this only too well as he is charged with the security of many companies’ data.

The evolution of UTM

01 April, 2010

A scant decade ago, packet-filter firewalls were sufficient to protect against virtually all threats coming from the internet. Today, however, the number, variety and sophistication of threats against business networks have multiplied, and firewalls and antivirus software on desktops are no longer sufficient. This has led to the evolution of unified threat management (UTM) solutions, reports Fortinet’s Richard Stiennon.

User behaviour drives broader malware attacks

31 March, 2010

A Blue Coat Systems report has examined evolving malware attack strategies that exploit online user behaviour.

  • All content Copyright © 2022 Westwick-Farrow Pty Ltd