Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Author: admini

Symantec, SonicWall Unveil New Security Gear

Posted on August 29, 2005December 30, 2021 by admini

SonicWall Inc. will announce the Pro 4100.  The 10-port, gigabit UTM (unified threat management) appliance offers a wide range of security features, including a “Clean VPN” function that spots malicious traffic in encrypted VPN sessions.  The Pro 4100 appliance from SonicWall will sell for US $6,995 and is a high-speed gateway with built-in antivirus, antispyware, antispam, intrusion prevention, VPN and secure wireless LAN features, said Jon Kuhn, director of product management at SonicWall of Sunnyvale, Calif.

The high number of gigabit ports is designed to support organizations with internal segmentation and a large number of applications that need high-speed Internet access and a port density, SonicWall said.  As opposed to just putting a “brick wall” between corporate networks and the Internet, the 4100 is designed to spot threats originating inside corporate networks, or over wireless network segments, as well as those from the public Internet, Kuhn said.  For example, the Clean VPN feature inspects connections from mobile users and branch offices for malicious code and vulnerabilities.  The idea is to create a “trusted network” across both wired and wireless networks, SonicWall said.

The news follows an announcement from Symantec Corp., which unveiled Symantec Gateway Security 5600 Series, a new line of security appliances that can scale up to 3 Gbps of throughput suitable for campus-sized networks.  The appliances use Symantec’s DDR (Dynamic Document Review) technology that allows administrators to define sensitive words and word relationships.  Customers using existing Symantec Gateway Security 5400 series appliances and Symantec Clientless VPN Gateway 4400 Series can get the 5600 series features with an upgrade to the Symantec Gateway Security Version 3.0 software, Symantec said.

Unified threat management appliances have become very popular with enterprise IT managers in recent years, said Charles Kolodgy, an analyst at IDC.  While companies advertise the speed of their UTM devices, Kolodgy warns that throughput ratings are typically based on configurations with the firewall and intrusion detection features enabled.

http://www.eweek.com/article2/0,1759,1853689,00.asp?kc=EWRSS03119TX1K0000594

Read more

Networking giant sets site on security intelligence

Posted on August 29, 2005December 30, 2021 by admini

Catherine Nelson, security analyst with Cisco’s Security Intelligence team, which manages the site, said Cisco is helping to pioneer this vendor-neutral standard for rating security threats.

“We feel like it helps to streamline security information across the board to our customers — across products and across platforms,” Nelson said.

Nelson said the site is continuously updated by a team of Cisco security analysts who monitor the threat landscape for threats to thousands of products, gleaning information from numerous public and private sources.

Nelson predicted it typically takes between 60 and 90 minutes to go from threat identification to posted alert on the site.

http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci1117595,00.html

 

Read more

CA Ranked Top Identity and Access Management Software Vendor Again

Posted on August 29, 2005December 30, 2021 by admini

The market is forecast to grow by $4 billion in the next four years, thanks in part to federal mandates included in Sarbanes Oxley and HIPPA, according to the report.

Identity fraud and increasingly high standards for privacy and security are also expected drive growth.

IDC states that Web single sign-on, host SSO, user provisioning, advanced authentification, legacy authorization and directory services are key to identity and access management.

CA’s integrated IAM suite allows customers to centrally operate security systems, reducing complexity and costs.

http://www.techweb.com/wire/security/170101470

Read more

Cisco sensor flaw

Posted on August 26, 2005December 30, 2021 by admini

Cisco said in an advisory that an attacker could use the bug to pretend to be a legitimate Cisco Intrusion Detection Sensor (IDS) or Intrusion Prevention System (IPS), and collect login credentials, submit false data to IDSMC and Secmon or filter what data the two products see.

Cisco also warned, as a separate matter, a bug in its Intrusion Prevention System (IPS) that could allow a local user to gain full administrator privileges.

Although the flaws aren’t highly serious, the fact that Cisco’s products are so widely used gives them more potential impact.

Cisco offered patching instructions for the flaws in its advisories.

http://www.xatrix.org/article4058.html

Read more

Colleges Lead Charge for Secure, Open Networks

Posted on August 26, 2005December 30, 2021 by admini

At Colby-Sawyer College in New London, New Hampshire, almost 1,000 students will arrive on campus this week, most with one or more computers in tow. The influx will more than double the number of systems on the campus network, which operates 50 or 60 Windows and Linux servers and around 650 desktops to support administration and other college employees, said Scott Brown, an information security analyst. All students are provided and required to install free copies of NOD32, a desktop antivirus software product from ESET Software and with Webroot Software Inc.’s Spy Sweeper antispyware software before they connect to the campus network.

To enforce that policy, Brown and his colleagues are using Campus Manager, a product from Bradford Networks Inc. that tracks student computers using their unique MAC (Media Access Control) address. Students who attempt to connect to the campus network are directed by Campus Manager to a virtual LAN where they can install the ESET Software and Webroot Software.

Colby-Sawyer also removes existing antivirus and antispam software from the student computers and connects the system to Microsoft’s Web site to obtain the latest Windows operating system patches, Brown said.

Before giving students access to campus resources, Colby-Sawyer also uses a new CAT (client assessment tool) that scans the student computers and verifies that antivirus and spyware definitions, as well as Windows patches are up to date.

The story is similar at Cornell University, in Ithaca, New York, where network administrators used home-grown technology to quarantine systems belonging to about 6,500 students who arrived on campus last week.

http://www.eweek.com/article2/0,1759,1852852,00.asp?kc=EWRSS03119TX1K0000594

Read more

Banks abandoning SSL on home page log-ins

Posted on August 23, 2005December 30, 2021 by admini
Netcraft noted that three of the largest banks in the U.S. — Bank of America, Wachovia, and Chase — as well as credit card giant American Express, now display their log-in forms on home pages not locked down with Secure Socket Layer (SSL).  The username and password are still encrypted when sent to the bank’s server, however; the form’s Submit or Login button points to an SSL-enabled “https” URL.
 
But as Netcraft noted, Microsoft took the practice to task as long ago as April, when in an entry on the Redmond, Wash.-based developer’s official Internet Explorer blog, program manager Eric Lawrence wrote that the idea was flawed and could be exploited by “man-in-the-middle” attacks.
 
http://www.informationweek.com/story/showArticle.jhtml?articleID=169600305
Read more

Posts navigation

  • Previous
  • 1
  • …
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme