(Go: >> BACK << -|- >> HOME <<)

Skip Links

Network World

Desktop Firewall / Host IPS News
2
The cost of not reaching IT project closure
All things, good and bad, eventually come to an end. Philosophers have told us this in many variations for at least three or four thousand years. In...
1
Vendor links firewalls to VMware hypervisor
Altor Networks has rewritten its firewall for virtual machines so the software plugs directly into VMware hypervisors, boosting the performance of...
1
Beware the default router password!
It is the simplest of security precautions, but it is one that still is often not followed: Change your default router password to something else.
Understanding the HP Data Deduplication Strategy WHITE PAPER
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data...
3
Heightened data-loss prevention needs fuel arms race between vendors
Data-loss prevention is rapidly becoming the next big battlefield in IT security.
1
Security on a stick guards British diplomatic business
When it comes to security, the British government's Consulate-General in New York, part of the United Kingdom's diplomatic mission for business and...
4
Palo Alto adds VPN gateway, traffic shaping to firewalls
Palo Alto Networks is adding an SSL VPN gateway and traffic shaping to its firewalls, offering businesses another opportunity to reduce the number of...
Free yourself to do more, while securing your business simply and cost-effectively WHITE PAPER
In tough economic times, with tightened budgets and heightened competition, it's vital for businesses to secure their systems and data against a...
1
Obama's cybersecurity chief to be a 'coordinator' not 'czar'
In a speech at the White House today, President Obama put forward his vision for protecting the nation’s critical IT infrastructure from attack, and...
Microsoft's identity cloud platform enters Beta 2
Microsoft Monday released the Beta 2 of Geneva, its identity platform for the cloud, adding single sign-on capabilities across server applications...
5
Inside a data leak audit
When the director of IT at a Boston-based, midsize pharmaceutical firm was first approached to participate in a data leakage audit, he was thrilled....
Laws, regulations and compliance: Top tips for keeping your data under your control WHITE PAPER
The challenge of complying with a growing number of frequently changing government, industry and internal regulations designed to protect data is...
Most common data leak violations
With more than two decades of security audits under his belt, Networks Unlimited President Harry Segal has seen it all. Here are the most common...
1
Businesses losing fight against employee apps
Enterprises are struggling to control the use of consumer applications within the workplace, despite the panoply of security tools being used within...
Entrust to be acquired by private equity firm for $114 million
Entrust has entered into a deal to be acquired by private equity investment firm Thoma Bravo for $114 million.