Similar Articles |
|
CIO June 15, 2003 Dylan Tweney |
Defensive Postures Intrusion prevention systems offer the latest countermeasures in the war against hackers, worms and viruses. |
Linux Journal May 1, 2002 Pedro Paulo Ferreira Bueno |
Understanding IDS for Linux A discussion of the different types of intrusion detection systems and how to create signatures to identify attacks... |
InternetNews October 31, 2005 Jim Wagner |
Alert Sounds Alarm From Within Security vendor Alert Logic has launched a hosted subscription service that protects enterprise networks from internal attacks. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
InternetNews October 6, 2005 Clint Boulton |
Check Point Locks Down Intrusion Prevention Check Point Software Technologies agreed to buy intrusion prevention provider Sourcefire. |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
Wall Street & Technology June 12, 2007 Anne Rawland Gabriel |
T. Rowe Price Adopts Intrustion-Prevention Systems From TippingPoint The investment management firm thwarts malware and pleases Sarbanes Oxley auditors with the adoption of an intrusion-prevention system from TippingPoint. |
PC World July 29, 2002 Sam Costello |
Symantec Unveils Blended Security Software New product mixes firewall, antivirus, and intrusion detection tools to better protect PCs from a new wave of threats. |
Military & Aerospace Electronics March 2005 John McHale |
Intrusion secures status for U.S. Army at Fort Huachuca Officials at Intrusion completed a yearlong information security project with the U.S. Army's Directorate of Information Management Fort Huachuca, Ariz. |
RootPrompt.org June 26, 2000 Lance E. Spitzner |
Knowing When Someone Is Knocking Lance E. Spitzner tells us how you can protect yourself by detecting intrusion attempts and then covers what you can do about them. |
PC Magazine April 29, 2004 Jay Munro |
Symantec Client Security 2.0 Symantec Client Security 2.0 provides a strong defense for PC users on your network. With its easy-to-use interface, clear documentation, and straightforward setup, SCS is a good choice for corporate protection. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
T.H.E. Journal February 2005 Patrick Hinojosa |
Information Security: Where We've Been and Where We Need to Go Proactive technologies that can protect against new, unknown threats without human intervention must be deployed to ensure the integrity of IT systems. |
InternetNews December 12, 2005 Jim Wagner |
Angling to Guard Inside Information Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside. |
InternetNews May 8, 2009 Alex Goldman |
FAA's Web Security Audit: 3,857 Vulnerabilities Basic errors such as using default passwords are evident within the U.S. air traffic control system, resulting in three critical breaches in the last four years. |
Wall Street & Technology April 22, 2005 Maria Santos |
IT Security a Top Budget Priority CEOs and CFOs report that virus protection, employee access to IT systems and intrusion detection are the top risk-prevention measures. |
InternetNews June 4, 2004 Sean Michael Kerner |
McAfee VirusScan and More Latest release of enterprise product includes intrusion detection. |
Investment Advisor November 2005 Andrew Gluck |
The Gluck Report, Part ii: Is the IDS PMS DOA? A late-breaking bulletin suggests that it's all over for support for the IDS portfolio management software offering for financial advisors. |
InternetNews April 7, 2006 Tim Scannell |
Norm Laudermilch, CTO, Trust Digital Most companies aren't prepared to prevent malicious code from hopping from cell phones to enterprise networks, or tracking it when it happens. |
Bank Systems & Technology March 30, 2004 Cynthia Ramsaran |
KeyBank Streamlines Marine Loans Bank links to Integrated Dealer Systems electronically to eliminate paperwork. |
Investment Advisor August 2005 Andrew Gluck |
The Gluck Report, Part I: A Cautionary Tech Tale Integrated Decision Systems, a portfolio management and accounting software company that set a new standard for RIAs and was chosen by Fidelity Investments as the centerpiece of its new integrated advisor platform, has unraveled and its survival is in question. |
InternetNews July 28, 2010 |
Sourcefire Debuts Integrated Security Tool New open source Razorback framework aims to give security professionals a unified view of the assets across the enterprise, amassing and correlating data from an array of points on the network. |
InternetNews March 27, 2007 Sean Michael Kerner |
Speedy Security Exploits with Metasploit 3.0 The revamped open source Metasploit 3.0 framework promises to be faster than ever at leveraging security flaws. |
Wall Street & Technology April 27, 2005 Jim Middlemiss |
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. |
InternetNews September 9, 2004 Sean Michael Kerner |
McAfee Secured For Defense With EAL3 Intrushield Intrusion Prevention System now certified to Common Criteria EAL 3. |
National Defense July 2004 |
Sensor Detects Intruders on the Move Manufactured by Senstar-Stellar Corp. of Carp, Ontario, Repels is a deployable intrusion system featuring an invisible electromagnetic detection zone along a perimeter. |
InternetNews April 29, 2009 Alex Goldman |
Trend Micro Snaps Up Third Brigade in Cloud Push Trend Micro's acquisition of Third Brigade shows that it recognizes the importance of datacenter security and foresees fast and significant change. |
InternetNews June 5, 2009 Alex Goldman |
For Better Network Security, Know What You Have A security expert speaking at Cyber Infrastructure Protection '09 said that most data breaches occur in places on the network that are not monitored or secure. Managers who know their network can block most attacks. |
InternetNews January 16, 2008 Larry Barrett |
IBM's IDS to Support Mac Platform IBM's forthcoming Informix Dynamic Server will now provide OLTP data serving capabilities for OS X 10.5. |