MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 23, 2006
Michael Hickins
IBM to Buy Internet Security Systems IBM is bulking up security consulting services with its acquisition of Internet Security Services in a $1.3 billion all-cash deal that values the Atlanta-based ISS at $28 per share. mark for My Articles similar articles
InternetNews
November 10, 2006
Clint Boulton
IBM to Unveil First Security Device From ISS IBM Monday plans to unveil the first appliance from its security division, the IBM Proventia Management SiteProtector device. mark for My Articles similar articles
InternetNews
August 24, 2006
Michael Hickins
Will All of ISS Fit With IBM's On-Demand Strategy? ISS's commitment to services is unquestioned, but half of its revenues come from on-premise solutions. How will those ISS products fit? mark for My Articles similar articles
InternetNews
February 18, 2005
Erin Joyce
All Your Security, Baked Into One Appliance Unified threat management devices emerge as the hot new gadget at the RSA Security Conference. mark for My Articles similar articles
PC Magazine
June 22, 2005
Oliver Kaven
One-Stop Security The Unified Threat Management appliance is a new approach to net security that may replace traditional firewalls, antivirus software, antispam software, etc. at small and mid-sized businesses. mark for My Articles similar articles
InternetNews
September 24, 2008
Richard Adhikari
Virtual Security? The PHANTOM Knows. IBM's PHANTOM project aims to detect ghosts in the virtual machine. mark for My Articles similar articles
InternetNews
July 20, 2007
Sean Michael Kerner
IDC: SCM is Hot Secure content management is why the security appliance marketplace is having a hot year. It's a market that is moving from a software-only approach to the appliance form factor, much the same as other segments of threat management. mark for My Articles similar articles
Inc.
October 2005
John Fried
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. mark for My Articles similar articles
InternetNews
March 23, 2005
Tim Gray
Symantec Hosts Security Program The computer security software vendor launched Hosted Mail Security, a comprehensive set of services designed to protect businesses against spam and viruses. mark for My Articles similar articles
InternetNews
August 16, 2004
Jim Wagner
Postini Beefs Up Perimeter Defenses The managed e-mail security firm adds features that free administrators of much of the hassle in dealing with spam while giving individual users more control over their settings. mark for My Articles similar articles
InternetNews
January 27, 2004
Janis Mara
Brightmail Bows Reputation Service Anti-spam software company Brightmail has launched the Brightmail Reputation Service, which identifies prime sources of spam and blocks the bad stuff while (hopefully) ensuring delivery of the good. mark for My Articles similar articles
InternetNews
April 28, 2010
ISS Founder Tackling Smart Energy at Joulex Internet Security Solutions founder Tom Noonan talks about his new challenge, energy, that he's taking on with the startup Joulex, focused on managing energy usage over an IP network. mark for My Articles similar articles
InternetNews
July 16, 2010
IBM's IPS Update Improves Security Features With its latest Network Intrusion Prevention update, IBM is bringing added levels of "non-traditional IPS capabilities" into its platform. mark for My Articles similar articles
T.H.E. Journal
April 2004
Jim Myers
Security Software Enriches Troy City Schools Educational Experience by Providing Safe E-Mail To address the requirement of schools to block and monitor all e-mail originating both internally and externally, anti-spam technology has emerged as a vital tool. mark for My Articles similar articles
Inc.
June 2007
Michael Fitzgerald
The Best Spam Fighters Six ways to protect your E-mail. mark for My Articles similar articles
PC Magazine
January 26, 2005
Matthew D. Sarrel
Lock Down Your E-Mail Businesses that live and die by e-mail have to get serious about keeping it safe. If you're concerned about viruses that can overload your servers, legal and regulatory liability for message content, and an ever-growing deluge of spam, read on. mark for My Articles similar articles
PC Magazine
March 2, 2004
Davis D. Janowski
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. mark for My Articles similar articles
CIO
August 1, 2002
Malcolm Wheatley
Inside a Security Response Center A growing number of customers have hired Atlanta-based security software and systems vendor ISS, and other security companies such as Enterasys Networks and Cisco Systems, to maintain a real-time watch over their firewalls and systems. mark for My Articles similar articles
PC World
June 2006
Andrew Brandt
New Devices Promise Protection in a Box These security gateways claim to stop threats before they reach your network. Netgear WGT624SC Super G Wireless Router... the Spam Cube... TrustEli Eli Security Appliance... mark for My Articles similar articles
The Motley Fool
December 28, 2004
Alyce Lomax
AOL Spammers Scram? The Internet service provider claims drastically reduced spam. Although being able to claim this victory is a help, it is not the whole recipe for AOL's future success. mark for My Articles similar articles
T.H.E. Journal
August 2004
Spam Sleuth Enterprise Helping keep e-mail inboxes spam-free is the goal of this Blue Squirre offering, which is an anti-spam server solution that resides on an e-mail server or as a separate server to screen out spam before it reaches the internal mail server. mark for My Articles similar articles
T.H.E. Journal
April 2004
NetCleanse, Spam Sleuth Protect From Viruses and Spam Solutions for protection from viruses and spam that promise to eliminate computer vulnerabilities. mark for My Articles similar articles
CIO
November 15, 2002
Meridith Levinson
Seething over Spam New tools and legislation can help--but nothing can stop it all mark for My Articles similar articles
InternetNews
March 9, 2004
Susan Kuchinskas
Major ISPs to Stand Firm on Anti-Spam Fight AOL, EarthLink, Microsoft, and Yahoo! are expected to outline their progress against unwanted e-mail. mark for My Articles similar articles
InternetNews
July 1, 2004
Sharon Gaudin
U.S. Sending More than Half of All Spam While the flood of spam has increased sharply during the last six months, a new survey also shows that slightly more than half of it worldwide is coming out of the U.S. mark for My Articles similar articles
AskMen.com
Ross Bonander
4 Steps: Eliminate Spam Before your inbox gets hit one more time, read up on our four steps to eliminate spam. mark for My Articles similar articles
InternetNews
July 20, 2009
Microsoft, Sophos: Most Spam Comes From U.S. Where does spam come from? If you guessed the U.S., you'd be right. mark for My Articles similar articles
InternetNews
April 29, 2010
China Slides Out of Spam Top 12 While China is widely regarded as the unofficial headquarters for hacking and digital espionage, the country doesn't even crack Sophos' Top 12 for spam production. mark for My Articles similar articles
New Architect
December 2002
Lincoln D. Stein
Spammed I Am Why laws meant to fight spam aren't making a dent mark for My Articles similar articles
InternetNews
February 6, 2008
Andy Patrizio
Spammers Go Old School as Gimmicks Fail Symantec finds image-based spam is losing out in favor of text links that people still seem all too willing to click. mark for My Articles similar articles
Salon.com
June 24, 2002
Andrew Leonard
Spam vs. spam The only way to stem the flood of unwanted e-mail may be to harness a million eyeballs and an army of open-source hackers. mark for My Articles similar articles
Fast Company
Rose Pastore
Google Can Tell If An Email Came From You... Or An Impostor Google detailed its latest spam-fighting artificial intelligence technology, which employs a brain-like network that detects spam masquerading as legitimate correspondence. mark for My Articles similar articles
PC Magazine
August 2, 2006
Matthew D. Sarrel
Win the War on Spam You're outnumbered and surrounded, but the fight is not over yet. Here's how to battle the spam armada. mark for My Articles similar articles
CIO
November 1, 2003
Alice Dragoon
Be a Spam Slayer The ubiquitous awfulness of spam affords CIOs a rare opportunity to look good. Here's how CIOs can leap into the spam fray and keep e-mail viable and valuable for users. mark for My Articles similar articles
InternetNews
May 26, 2009
Alex Goldman
Spam Now More Than 90% of All E-Mail Spammers are increasingly directing users to compromised social networks while botnets' influence grows, according to MessageLabs. mark for My Articles similar articles