F5 Networks IP Intelligence service
16 July, 2012The IP Intelligence service is a cloud-based solution that enables organisations to safeguard their infrastructures by detecting and stopping access from IP addresses associated with malicious activity.
Logicalis Virtual Workspace offers Citrix/Cisco solution to BYOD
30 April, 2012Logicalis Virtual Workspace (LVW) combines Cisco and Citrix desktop and application virtualisation, voice and video technology via a small footprint, virtual environment, combined with mobile device management to address the security, storage, cost and productivity concerns around bring your own device (BYOD) computing and mobile workforces.
Blue Coat Unified Web Security cross-network protection
29 March, 2012Unified Web Security is claimed to enable an organisation to expand its secure perimeter to users in any location, on any network, across any device, to close the security gaps that leave them exposed to malware threats and data loss.
McAfee Enterprise Mobility Management (EMM) 10.0
13 March, 2012Enterprise Mobility Management (EMM) 10.0 includes security updates for enterprise customers, providing IT with improved control to identify, secure and assign policies to both employee- and business-owned smartphones and tablets, to support BYOD practices.
Outback supermarket chain deploys secure two-way satellite services
12 March, 2012Outback Stores is a company that manages remote stores on behalf of Australian Indigenous communities in the Northern Territory, Western Australia and South Australia. The company has deployed network and security solutions to securely connect its many remote locations.
Thales nShield HSM integrated with Infoblox DNS
14 February, 2012The Thales nShield hardware security module (HSM) has been integrated with the Infoblox DNS platform to address common DNSSEC deployment challenges and enable service providers, government departments, financial institutions and other organisations to secure their online identities more easily and protect critical services against cyberthreats.
50 ‘hacktivist’ amateur DDoS tools analysed
08 February, 2012Network security vendor Arbor Networks has published a visual review of DDoS tools that are used by ‘hacktivist’ collectives - groups that hack into computers and organisations as a form of political protest.
Check Point cloud-based software blades
17 January, 2012Check Point Software Technologies’ security gateways are available through Amazon Web Services. Organisations can apply the same level of security and control to their public cloud network as they have to their traditional networks, extending their security to the cloud with over 30 software blade protections, including firewall, IPS, virtual private network (VPN), application control, URL filtering, mobile access and data loss prevention (DLP).
Grace Christian School deploys web filtering solution
19 December, 2011Grace Christian School has deployed a web filtering and anonymous proxy prevention solution, providing its students and staff with a safer and more secure IT environment.
ComNet CWGE2FE24MODMS 26-port modular gigabit ethernet switch
19 September, 2011 byComNet has introduced a 26-port modular gigabit ethernet switch for commercial security applications.
Inside the Platform Networks hacking attack
01 August, 2011 by Andrew CollinsPlatform Networks, Australian telco wholesaler and NBN affiliate, last week revealed it had been on the receiving end of a six-month-long hacking attack. Andrew Collins talks to Platform’s managing director, David Hooton, about the disclosure of information on the incident to the Australian Federal Police, and a forthcoming case study on the attack and the company’s defence against it.
NBN "not hacked" in Platform Networks attack, says NBN Co
28 July, 2011NBN Co has denied that its systems were compromised during the attack on its partner Platform Networks that was revealed earlier this week.
Brennan IT SecureView real-time network security
11 July, 2011 byArbor Networks and Brennan IT have partnered to deliver the SecureView service that can be used to enhance security on private IP networks.
Wireless security considerations
07 June, 2011With the continuing proliferation of WLANs, network administrators have some tough choices to make when it comes to securing these wireless networks. Hemant Chaskar*, Director of Technology at AirTight Networks, takes a closer look at these decisions.
F5 Networks BIG-IP Global Traffic Manager (GTM)
16 May, 2011 byThe F5 Networks BIG-IP Global Traffic Manager (GTM) helps users deploy domain name system security extensions (DNSSEC) protection for newly signed .com and other internet domain types.