M86 Security Web Filtering And Reporting Suite (WFR) version 4.1 with M86 VuSafe
11 May, 2011 byThe M86 Web Filtering And Reporting Suite (WFR) version 4.1 integrates the M86 VuSafe service for schools. M86 VuSafe is an easy-to-use, secure video library enabling educators to find, tag, organise and share online videos from YouTube without showing inappropriate videos, advertisements, viewer comments or outside links. VuSafe is free to WFR users.
ProSecure UTM150 unified threat management appliance
27 April, 2011The ProSecure UTM150 unified threat management appliance can be used for data security for users adopting the cloud. With Stream Scanning technology, the appliance uses virus and malware threat databases from ProSecure and Sophos that are up to a claimed 400 times more comprehensive than legacy all-in-one platforms, at a speed that is up to a claimed five times faster than conventional methods.
Kaspersky Lab security software
14 March, 2011 byKaspersky Lab products, Endpoint Security 8 for Mac, Endpoint Security 8 for Linux and Kaspersky Endpoint Security 8 for Smartphones, are designed to protect against IT security threats.
Axway SecureTransport enterprise clustering
14 March, 2011 bySecureTransport simplifies and secures file transfers between people, sites, applications and external partners, providing visibility into information flows both within and outside of the organisation, while ensuring compliance with global mandates.
NXP Semiconductors/Giesecke & Devrient NFC mobile devices secure interface software
14 March, 2011 byNXP Semiconductors and Giesecke & Devrient’s joint software solution offers secure interfaces between the handset, NFC functionality and secure elements such as the SIM card. This solution enables NFC to be integrated securely into mobile handsets based on the Android platform and other operating systems. In addition, the validated software will meet the needs of mobile network operators who require secure elements within the handset.
EMC names new president of RSA
17 February, 2011Tom Heiser has been named as President of RSA, the security division of EMC.
Royal Flying Doctor Service flies into the cloud
15 September, 2010The not-for-profit Royal Flying Doctor Service Western Operations (RFDSWO) provides a 24-hour health lifeline for people living, working or travelling in rural and remote areas of Western Australia and the Indian Ocean Territories.
Australia scores in the middle of online risks
27 August, 2010According to internet security company AVG Technologies, web surfers in Turkey, Russia, Armenia and Azerbaijan are the most likely to face threats while online. The safest countries seem to be Sierra Leone and Japan.
Call for smartphone vendors to simplify security
28 July, 2010At a recent roundtable in Sydney, Scott Totzke, Security VP for Research In Motion (RIM), discussed the need for smartphone vendors to simplify security to improve usability for end users, the need to build security in from the start of the production cycle to maximise the efficiency of mobile devices and how trust is essential for the future development of mobility.
Set-and-forget network security for Parade College
28 June, 2010Parade College is a dual campus Catholic boys school which since 1871 has sought innovative, creative and effective ways of achieving best practice teaching and learning. Protecting a network that is used by close to 2000 students and teachers is not a job for the faint-hearted. Parade College has a network with over 720 personal computers for the use of students, 270 personal computers for teachers and a suite of ‘e-rooms’ or shared spaces containing computers within a cluster of classrooms. Underpinning the IT strategy is a program to continuously evaluate and deploy new technologies to strengthen the security of its network.
Is unified access control the answer to security?
11 May, 2010Protecting an IT environment now consumes more resources than actually managing the network. There are more devices connected, more people collaborating, more dispersal of access points and an enormous increase in the amount of traffic and type of traffic on the network. Juniper Networks’ Matt Miller looks at the following issues and provides some remedies. Even if you can secure all entry points, the biggest issue is scale. How do you ensure only the right people can see the right data at the right time when network capacity is already strained?
Seccom Global SecureScreen cloud security system
13 April, 2010 bySecureScreen utilises global in-the-cloud infrastructure to enforce and maintain comprehensive information security and corporate policy. With no hardware or software to install, near-zero latency and an invisible footprint, it is cost effective and is claimed to be a most complete, flexible, comprehensive network security system in its class.
The evolution of UTM
01 April, 2010A scant decade ago, packet-filter firewalls were sufficient to protect against virtually all threats coming from the internet. Today, however, the number, variety and sophistication of threats against business networks have multiplied, and firewalls and antivirus software on desktops are no longer sufficient. This has led to the evolution of unified threat management (UTM) solutions, reports Fortinet’s Richard Stiennon.
US tops spread of malware
11 March, 2010The US, Germany and China are the top three countries with web servers serving malware but the US comes in at 40%.
SonicWALL SonicOS 5.6 deep packet inspection
10 March, 2010 byThe SonicOS 5.6 deep packet inspection for SSL traffic is an upgrade to the operating system for the SonicWALL TZ, NSA and E-Class NSA firewalls.