Bidvert-advert

Stay Update - ICT Security

Enter your email address:

We hate spam as much as you do and we will never sell, barter, or rent your email address to any unauthorized third party.

Most Frequently Used Software


CURL / XPertMailer / AutoBlogger / (Parser - PHP Simple HTML DOM)



domenica 29 aprile 2012

News briefly: this week\'s launches at Infosecurity Europe

This in short numerous technology launches to coincide with the Infosecurity Europe conference in London. Here's a round-up of what we saw and heard.

CORE Security launched Insight Enterprise 2.0 to give a complicated security intelligence approach to continuously predict IT threats and pre-empt business risk and link them to the true risk to the business. a true-time security intelligence platform, CORE Insight provides unified threat validation and prioritisation while feeding key analytics to the safety ecosystem. Version 2.0 offers a comprehensive set of vulnerability management capabilities, including: integrated network and web application vulnerability scanning; attack planning and simulation; threat replication; dashboards and reporting; and vulnerability remediation on a single platform.

Bloxx launched the Secure Web Gateway which combines the company's real-time content analysis and classification engine, Tru-View Technology, with Sophos's anti-malware and the Bloxx SSL proxy. This may provide customers with unsurpassed levels of content filtering and protection against web-based security threats for HTTP and HTTPS web traffic. It also launched the Bloxx iPad Browser which lets organisations quickly and simply extend the potential in their Bloxx Web Filter or Secure Web Gateway to enforce web access policies for iPads used off-network. The Bloxx iPad Browser will filter web traffic over a WiFi connection when the device is attached to an organisation's network or used off-network, for instance at home or connected to a public WiFi network. Moreover, if the iPad has 3G connectivity, then access policies will still be enforced with the Browser installed.

Imation launched its StealthZONE PC-on-a-stick desktop environment to enterprise customers. It said this can solve the BYOD conundrum by providing a safe, consistent work environment on any USB-capable endpoint, meaning that the alternative of host machine is unimportant because the user plugs a managed, secure StealthZONE USB device into their home computer, laptop or almost any unsecured Windows PC, and boots Windows from the USB device. After as much as three-factor authentication, the user gains access to a totally isolated Microsoft Windows workspace.

Cryptzone launched the newest release of its policy management software, NETconsent Compliance Suite, which ensures employees are acquainted with policies, educated at the reasons they're important and tested to peer in the event that they understand their responsibilities. It said documents delivered through NETconsent can now be accessed and signed as much as from tablets on the point of use, while every bit of content may also be categorised by any standards concerning it.

BeyondTrust launched an information-loss prevention product with real-time artificial intelligence that gives organisations with a "zero-touch" approach to secure critical data without writing a single rule. It said that PowerBroker DLP v4.0 included Active Profiler DX, BeyondTrust's patent-pending technology that intelligently monitors and profiles ongoing user behaviour and activity and learns the standard behaviour of every user inside the enterprise, automatically detecting and preventing data-leak threats, and eliminating the costly means of continuously discovering and classifying data on the way to then identify suspicious activity. It also said that the PowerBroker DLP is context-aware, having the ability to identify intellectual property and private, health, or financial data, allowing it to make smarter decisions about when to report or block suspicious activities.

Digital Assurance launched the virtual penetration tester DAVE, that's designed to extend the power and efficiency of security testing that resides at the network or within the cloud and will be activated to hold out rigorous penetration testing on demand. Tests are executed manually by specialist Digital Assurance penetration testers, providing an identical levels of workmanship while eliminating the fees linked to bringing in personnel and direct-site access.

Conseal Security announced the launch of its server to enable organisations to take care of complete control over their private data when it can be at the move. It said this offers IT departments management of removable storage as they may be able to centrally control sensitive data stored on removable devices via their organisation's private cloud. In addition to protecting data against password guessing attempts via Conseal's Dual Locks system, it allows remote wiping of any removable USB storage device, and highly flexible access control rules enable tight control over who has access to data. The Conseal Enforcer also allows administrators to enforce policy for all external devices, including having the ability to prevent using insecure data storage by locking down and controlling what's allowed to attach via users' USB ports.

Trend Micro launched Deep Discovery to avoid advanced persistent threats by providing the tools to detect zero-day malware and tell-tale malicious human activity around the entire network; it also offers in-depth analysis so firms can prevent similar attacks sooner or later. It said Trend Micro's Smart Protection Network reputation engine and blacklisting capabilities detect and block the command-and-control channels utilized by the attackers to speak with the malware embedded within the target organisation. The corporate has also drawn up a group of behavioural rules in accordance with classic signs of an APT attack, including multiple log-in failures and knowledge exfiltration, in order that Deep Discovery can flag up a probable intrusion. A sandboxing feature is accessible to permit the user to lay any newly discovered malware under the microscope.

Fortinet expanded its network security solution suite with dedicated distributed denial of service (DDoS) protection products. It said the FortiDDoS-100A, FortiDDoS-200A and FortiDDoS-300A are designed to detect and help protect against today's most damaging and complex DDoS attacks. It said all FortiDDoS appliances feature eight virtualised network partitions with independent protection policies for virtualised environments, automatic traffic profiling and rate-limiting, context-aware policy enforcement for optimum effectiveness. Additionally they provide real-time and historic attacking traffic analysis that delivers granular visibility of top attacks, top sources and top attackers.

Arbor Networks announced its Peakflow service platform to deliver automated protection from DDoS attacks launched by virtually all known botnets, plus a genuine-time update service that protects customers from new attack vectors as they emerge. Included is the ATLAS intelligence feed that delivers deep DDoS signatures in real time to maintain networks shielded from hundreds of botnet-fueled DDoS attack toolsets and their variants. It also delivers DDoS protections for SSL whatever the application and blocks SSL DDoS attacks with ASERT-designed protections that guard against malformed traffic, attempts to repeatedly renegotiate connections and other advanced attacks that aim to disrupt service availability.



Nessun commento:

Posta un commento

Comments links could be nofollow free