Both of these enhancements can also be combined into a Cisco security management suite.
http://www.zdnet.com.au/news/security/soa/Cisco_readies_security_enhancements/0,2000061744,39237994,00.htm
Security News Curated from across the world
Both of these enhancements can also be combined into a Cisco security management suite.
http://www.zdnet.com.au/news/security/soa/Cisco_readies_security_enhancements/0,2000061744,39237994,00.htm
BMC released BMC Identity Management .Net, which lets companies add user access, compliance, and password management into applications based on .Net. Due to lack of options, many businesses have been forced to build their own identity management apps for the .Net environment, says Somesh Singh, VP and general manager of BMC’s identity management group. BMC’s move to support .Net could help it stand apart from some of its large competitors in the business application market.”This will give small and medium businesses better automated control over their user populations, including access and the levels of privileges are being granted; something only large businesses have been able to afford and implement,”says Gerry Gebel, a Burton Group senior analyst, noting that BMC competitor Oracle doesn’t support the .Net environment with its security tools.
http://www.compliancepipeline.com/showArticle.jhtml?articleID=177105746
When asked why, Allchin refused to answer, citing complicated reasons. Anyhow, Windows Vista is going to still be protected -to some level- through Windows Defender. Also, there will be a built-in firewall capable of filtering suspicious traffic originating from a Vista PC as well as ingress filtering.
http://www.xatrix.org/article.php?s=4274
“Safety and security is the overriding feature that most people will want to have Windows Vista for,” the co-president of Microsoft’s platform, products and services division said in an interview with CNET News.com. It is reversing its plan to add virtual folders that contain all the files that match specific criteria, such as “created by Michelle” or “images,” no matter where they are on the PC.
Originally, Microsoft wanted virtual folders to replace standard views, which show the physical location of files on a hard disk drive, but it has backpedaled on that decision. The software maker had already scaled back on planned features for Vista, leaving some out so it could meet a ship date in 2006 for the update.
Vista will go much further in protecting consumers, he said. “If we ever find something trying to open a port that the developer said it should not be opening, it is immediately shut down,” he said.
Additionally, Vista aims to offer improved security by letting people run their PC with fewer privileges, which control how a particular person can interact with the software. In Windows Vista, the default will likely be “protected administrator,” a new privilege level that Microsoft is introducing with Vista, Allchin said. The standard user mode has been improved from Windows XP–people won’t have to call IT to change their PC clock, for instance–but it won’t allow a user to install applications, for example.
http://news.zdnet.com/2100-3513_22-6032344.html
While millions of mobile employees are greatly enhancing their productivity by using wireless devices to conduct business in and out of the office, along with the convenience of wireless connectivity comes an increase in security threats, including bridging, probing laptop, ad-hoc peer-to-peer network, phishing, evil twin, man-in-the-middle and other attacks.
AirDefense Personal’s flexible policy engine allows enterprises to centrally create, distribute and enforce policies such as allowing the use of specific VPNs, banning insecure applications on unencrypted networks, banned bandwidth hungry applications such as P2P and Video Streaming, Bluetooth, high-speed data cards (EV-DO, GPRS, EDGE and other 3G technologies) and certain hot spots.
With the AirDefense RF Boost feature, administrators can easily create custom policies and alarms to address company-specific needs, and these policies may be defined by groups, such as sales, engineering or finance, and by profiles and actions, such as telecommuters or administrators.
AirDefense Personal 3.0 also enables administrators to “black list” non-sanctioned networks, such as overlapping neighbor networks, as well as to track the location of all enterprise information assets. For example, AirDefense Personal allows administrators to determine in which city a mobile worker is connected, or where he or she was last connected or attacked.
Highly efficient and requiring little memory, AirDefense Personal is designed to work in conjunction with other client utilities, and because the system is centrally managed, administrators can install agents with no end-user involvement to effectively monitor activity and enforce policies throughout the organization. Further minimizing the impact on network administrators, AirDefense Personal provides a user-friendly interface that affords managers “quick glance” detection of event status and actions from the minimized tool bar.
http://www.ebcvg.com/articles.php?id=1045
IronPort is not the only vendor to use reputation data filtering, but its database that analyzes and scores the IP addresses of incoming e-mail is one of the largest on the market, said Jay Gregg, practice manager with Houston-based solution provider Accudata Systems.
IronPort claims its SenderBase network is built with data from more than 100,000 participating organizations that identify bad URLs and known spammers. SenderBase filters out so much spam at the perimeter, customers initially don’t think it’s working because they no longer see as much spam on a quarantine list, Gregg said.
http://www.informationweek.com/security/showArticle.jhtml?articleID=177102942