MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
June 15, 2003
Dylan Tweney
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. mark for My Articles similar articles
Linux Journal
May 1, 2002
Pedro Paulo Ferreira Bueno
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... mark for My Articles similar articles
InternetNews
October 31, 2005
Jim Wagner
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. mark for My Articles similar articles
New Architect
May 2002
Jay Lyman
to Catch a Thief Effective incident response against network intruders... mark for My Articles similar articles
InternetNews
October 6, 2005
Clint Boulton
Check Point Locks Down Intrusion Prevention Check Point Software Technologies agreed to buy intrusion prevention provider Sourcefire. mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
Wall Street & Technology
June 12, 2007
Anne Rawland Gabriel
T. Rowe Price Adopts Intrustion-Prevention Systems From TippingPoint The investment management firm thwarts malware and pleases Sarbanes Oxley auditors with the adoption of an intrusion-prevention system from TippingPoint. mark for My Articles similar articles
PC World
July 29, 2002
Sam Costello
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. mark for My Articles similar articles
Military & Aerospace Electronics
March 2005
John McHale
Intrusion secures status for U.S. Army at Fort Huachuca Officials at Intrusion completed a yearlong information security project with the U.S. Army's Directorate of Information Management Fort Huachuca, Ariz. mark for My Articles similar articles
RootPrompt.org
June 26, 2000
Lance E. Spitzner
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. mark for My Articles similar articles
PC Magazine
April 29, 2004
Jay Munro
Symantec Client Security 2.0 Symantec Client Security 2.0 provides a strong defense for PC users on your network. With its easy-to-use interface, clear documentation, and straightforward setup, SCS is a good choice for corporate protection. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
OCC Bulletin
May 15, 2000
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... mark for My Articles similar articles
T.H.E. Journal
February 2005
Patrick Hinojosa
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. mark for My Articles similar articles
InternetNews
December 12, 2005
Jim Wagner
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. mark for My Articles similar articles
InternetNews
May 8, 2009
Alex Goldman
FAA's Web Security Audit: 3,857 Vulnerabilities Basic errors such as using default passwords are evident within the U.S. air traffic control system, resulting in three critical breaches in the last four years. mark for My Articles similar articles
Wall Street & Technology
April 22, 2005
Maria Santos
IT Security a Top Budget Priority CEOs and CFOs report that virus protection, employee access to IT systems and intrusion detection are the top risk-prevention measures. mark for My Articles similar articles
InternetNews
June 4, 2004
Sean Michael Kerner
McAfee VirusScan and More Latest release of enterprise product includes intrusion detection. mark for My Articles similar articles
Investment Advisor
November 2005
Andrew Gluck
The Gluck Report, Part ii: Is the IDS PMS DOA? A late-breaking bulletin suggests that it's all over for support for the IDS portfolio management software offering for financial advisors. mark for My Articles similar articles
InternetNews
April 7, 2006
Tim Scannell
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. mark for My Articles similar articles
Bank Systems & Technology
March 30, 2004
Cynthia Ramsaran
KeyBank Streamlines Marine Loans Bank links to Integrated Dealer Systems electronically to eliminate paperwork. mark for My Articles similar articles
Investment Advisor
August 2005
Andrew Gluck
The Gluck Report, Part I: A Cautionary Tech Tale Integrated Decision Systems, a portfolio management and accounting software company that set a new standard for RIAs and was chosen by Fidelity Investments as the centerpiece of its new integrated advisor platform, has unraveled and its survival is in question. mark for My Articles similar articles
InternetNews
July 28, 2010
Sourcefire Debuts Integrated Security Tool New open source Razorback framework aims to give security professionals a unified view of the assets across the enterprise, amassing and correlating data from an array of points on the network. mark for My Articles similar articles
InternetNews
March 27, 2007
Sean Michael Kerner
Speedy Security Exploits with Metasploit 3.0 The revamped open source Metasploit 3.0 framework promises to be faster than ever at leveraging security flaws. mark for My Articles similar articles
Wall Street & Technology
April 27, 2005
Jim Middlemiss
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. mark for My Articles similar articles
InternetNews
September 9, 2004
Sean Michael Kerner
McAfee Secured For Defense With EAL3 Intrushield Intrusion Prevention System now certified to Common Criteria EAL 3. mark for My Articles similar articles
National Defense
July 2004
Sensor Detects Intruders on the Move Manufactured by Senstar-Stellar Corp. of Carp, Ontario, Repels is a deployable intrusion system featuring an invisible electromagnetic detection zone along a perimeter. mark for My Articles similar articles
InternetNews
April 29, 2009
Alex Goldman
Trend Micro Snaps Up Third Brigade in Cloud Push Trend Micro's acquisition of Third Brigade shows that it recognizes the importance of datacenter security and foresees fast and significant change. mark for My Articles similar articles
InternetNews
June 5, 2009
Alex Goldman
For Better Network Security, Know What You Have A security expert speaking at Cyber Infrastructure Protection '09 said that most data breaches occur in places on the network that are not monitored or secure. Managers who know their network can block most attacks. mark for My Articles similar articles
InternetNews
January 16, 2008
Larry Barrett
IBM's IDS to Support Mac Platform IBM's forthcoming Informix Dynamic Server will now provide OLTP data serving capabilities for OS X 10.5. mark for My Articles similar articles