Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: Product

Ex-NetScreen CEO takes on new start-up

Posted on September 23, 2004December 30, 2021 by admini

The company, which has built a server device that runs several identity protocols at once, announced earlier this week that it has hired Robert Thomas, NetScreen’s former CEO, as its own chief executive.

While at NetScreen, Thomas grew the company from a development-stage start-up with 31 employees to a flourishing public company with 950 employees. He also helped bring the company to a successful initial public offering in 2001. In February 2004, he helped sell the company to Juniper Networks in a deal worth $4 billion. Now Thomas is looking to do it all over again. “I was very fortunate that we were successful at NetScreen,” he said. “I learned lots of lessons that I hope to apply here.”

Infoblox, founded in 1999, has developed a server device that allows companies to run several identity protocols such as DNS, DHCP, Radius and LDAP at once, instead of running them on separate platforms like most companies do today.

Thomas argued that the old approach adds complexity and expense to the network. These standard protocols, some of which have been around for nearly a decade, are used to help large companies and service providers apply security policies to their networks.

Domain Name Service, or DNS, is used in the public Internet and private intranets to translate names of host computers into IP addresses.
Dynamic Host Configuration Protocol, or DHCP, allows computers to get temporary or permanent IP addresses from central servers.
Remote Authentication Dial In User Service, or Radius, is the de facto standard for authenticating users accessing networks remotely.
And finally, Lightweight Directory Access Protocol, or LDAP, is the standard protocol for clients accessing directory servers.

These protocols have become even more important to networking, because companies are now using them as part of an end-to-end security architecture. For example, Cisco and Microsoft plan to use Radius in their architectures, allowing networking devices to check the health of end points before they connect to the network.

Thomas compared today’s identity server market to that of the security market before NetScreen came on the scene. Like the identity market, companies bought point products for every security function, such as firewalls and virtual private networks.

NetScreen was one of the first companies to introduce a product that allowed customers to buy a single device that offered several security functions. Over the past couple of years, sales of these products have risen considerably.

“It’s a natural product evolution in product development to collapse functionality onto a single device to make it easier and simpler to use,” Thomas said. Although he believes Infoblox has an excellent strategy and product, Thomas acknowledged that one can’t build a company hoping that it will simply be acquired.

http://news.com.com/Ex-NetScreen+CEO+takes+on+new+start-up/2100-1033_3-5379059.html?part=rss&tag=5379059&subj=news.1033.5

Read more

Nokia Phone Adds Virus Protection

Posted on September 23, 2004December 30, 2021 by admini

Upcoming smart phone will feature a mobile version of F-Secure’s antivirus software.

Finnish mobile phone manufacturer Nokia will offer mobile antivirus software through F-Secure as one of the features in its new Nokia 6670 smart phone when it is released in October, the companies announced this week.

The Symbian OS smart phones will provide on-device protection, similar in fashion to antivirus protection programs for PCs, with automatic over-the-air antivirus updates for a monthly fee.

The software will not come loaded into the device, but can be downloaded from the F-Secure Web site, according to Nokia spokesperson Karoliina Lehmusvirta.

The Nokia 6670 will be the first mobile phone in its Series 60 line to offer the mobile virus protection, though users of other Series 60 mobile phones will also be able to purchase the antivirus protection software, “perhaps as early as October,” Lehmusvirta says.

F-Secure is also in talks with other handset manufacturers about offering similar antivirus protection, according to Matias Impivaara, business manager for mobile security services for F-Secure of Helsinki.

“This announcement is a starting point for us and we have been testing the service with a variety of handsets from different vendors and in several operator networks,” Impivaara says.

Nokia, based in Espoo, Finland, already offers antivirus software through F-Secure for its Communicator line of mobile devices, but Impivaara says the protection offered for the Nokia 6670 is a greatly improved version in terms of both features and pricing options.

“The first general offering for the mobile antivirus software came a couple of years ago, but this version has a whole new infrastructure,” Impivaara says.

“For example, it has a patented SMS [short message service] update mechanism and HTTPS [Hypertext Transport Protocol Secure] connections.

Lehmusvirta stresses that there is nothing about the Nokia 6670 that makes it particularly susceptible to viruses and that Nokia knows of no capabilities within any of its devices that a virus might exploit.

After a series of three malicious program targeting wireless devices were discovered in between June and August, security specialists stepped up their warnings of the pending possibility of serious attacks against mobile phones and PDAs.

F-Secure claims its mobile antivirus software service is the first commercially available product for protecting Symbian OS smart phones but IDC analyst Paolo Pescatore says similar programs can be expected in the very near future.

http://www.pcworld.com/news/article/0,aid,117904,pg,1,RSS,RSS,00.asp

Read more

P-cube goes hunting for zombie PCs

Posted on September 22, 2004December 30, 2021 by admini

P-Cube’s IP service control platform allows service providers to identify subscribers, classify applications and offer differentiated service performance. The technology makes it easier for telcos to control and manage advanced IP services such as voice-over-IP, interactive gaming, video-on-demand, or P2P traffic. P-Cube has tweaked this technology to help fight one of the principal causes of spam. A new version of the Engage service application (Engage v2.1) of P-Cube’s Service Control Platform released this week provides ISPs with a tool for network-based detection and protection from spam zombie attacks.

Worms such as MyDoom and Bagle (and Trojans such as Phatbot) surrender the control of infected PCs to hackers. These expanding networks of compromised zombie machines (dubbed ‘botnets’ by the computer underground) can be used for spam distribution or as platforms for DDoS attacks. By using compromised machines – instead of open mail relays or unscrupulous hosts – spammers can bypass IP address blacklists. A great deal of spam (between 40 to 80 per cent depending who you ask) originates from spam zombies. The large number of attacking machines makes it difficult to identify the source of a spam zombie-based attack or to take corrective action in real time without causing massive disruption to network operations and legitimate users.

P-Cube claims to have licked this problem with technology that is both application and subscriber-aware. The approach allows service provider to identify spam zombie activity from a particular subscriber, block their email transmissions and redirect the infected subscriber to a site where the system can be purged of the zombie infection. Engage can perform these functions without introducing latency into the network, P-Cube claims.

The approach is similar to the detect, isolate and cleanse approach Cisco has taken with its Network Admission Control program. The scheme involves a combination of technology from Cisco and AV vendors to combat the spread of computer worms across corporate networks.

P-Cube’s service platform competes with products from companies such as Ellacoya Networks and Sandvine.

As the market evolves its likely that traffic management technology will be increasingly brought into play alongside conventional anti-spam filtering in combating the zombie menace.

http://www.theregister.co.uk/2004/09/22/p-cube_zombie_buster/

Read more

VeriSign bundles authentication tools

Posted on September 21, 2004December 30, 2021 by admini

The package of security software and services, which incorporates elements of the company’s VeriSign Intelligence products and ControlSM Services, provides a centralized system for supporting various forms of network authentication, including passwords, smart cards and USB tokens, according to the Mountain View, Calif.-based maker of network security software.

By letting customers integrate multiple network-identification techniques, VeriSign says the product, dubbed VeriSign Unified Authentication, can save companies significant time and effort, while providing more secure IT systems protection.

The tools is set to become available Sept. 30.

VeriSign, which also serves as an Internet domain registry, said the package will let customers use existing security technology built into so-called directory services products, such as Microsoft Active Directory, Radius servers, and single-sign on infrastructure, including identity management software made by IBM’s Tivoli unit.

The company will offer the option for buyers to manage their own authentication operations or outsource those responsibilities to VeriSign using a hosted version of service. Executives at the company said the system will cost roughly $25 per user each year.

In addition to introducing the authentication package, VeriSign announced that it will release a Windows-specific version of the system later this year.

The company acknowledges that it would prefer customers to buy its entire Unified Authentication package, but it has created a version designed to integrate its security tools with elements of Microsoft’s Windows Server 2003 operating system. VeriSign said the package was created through a relationship it has established with Microsoft.

Known primarily for its role as one of the Internet’s primary sources of domain registry services, VeriSign has been pushing hard to build its network security business. Earlier this year, the company announced that it had won a multiyear agreement to provide security services for financial giant U.S. Bancorp; it has a similar deal in place with Merrill Lynch.

http://news.com.com/VeriSign+launches+authentication+tools/2100-7347_3-5375225.html?part=rss&tag=5375225&subj=news.7347.5

Read more

Microsoft Targets Continuity with Data Protection Server

Posted on September 20, 2004December 30, 2021 by admini

The software maker took the wraps off its Microsoft Data Protection Server at the Storage Decisions 2004 conference in Chicago.

Data Protection Server, or DPS, is currently in limited beta release and will expand to a public beta in the first quater of 2005.

Customers can expect the backup and recovery in the second half of 2005, said Jeff Price, senior director, Windows server product management.

Built to work in close tandem with Microsoft’s Windows Server 2003, Microsoft Storage Server 2003, and Active Directory, DPS is tabbed to help customers drive down costly backup and data recovery times as well as inefficiencies by recording changes within Windows file server workloads.
Nestled between file servers and a tape library system, DPS features deployed agents to locate all file servers, and then ensure appropriate configurable rules are in place for continuous change logging and replication. DPS will integrate with tape offerings via a backup interface currently in development. The interface is based upon Microsoft’s Volume Shadow Copy Service API located in Windows Server 2003, Price said. This will allow third-party tape backup vendors to partner with Microsoft to support DPS for Windows-based environments.

http://www.eweek.com/article2/0,1759,1648458,00.asp?kc=EWRSS03119TX1K0000594

Read more

Sun touts tougher security in Solaris 10

Posted on September 14, 2004December 30, 2021 by admini

Paul Sangster, senior Solaris security architect for the Santa Clara, Calif.-based company, touted Solaris 10’s security improvements during a roundtable discussion at Sun’s Burlington, Mass., offices Monday, saying, “Security touches everything we do, and in designing Solaris 10 we made the assumption that the Web server is sloppy” and in need of extra layers of protection. I expect IT administrators will greatly appreciate the N1 grid container zone feature and the user rights management privilege feature,” Sangster said. “These features enable (them) to much more tightly protect their services, even in the face of an attacker exploiting a known hole in some third-party software that was deployed but not yet patched.

He said the N1 grid container technology will allow users to create up to 4,000 secure, fault-isolated software partitions, each with its own IP address, memory space, file area, host name and root password.

Solaris 10 has been in development for two and a half years, and has slowly been made available to customers in recent months.

He added that Linux applications can run unmodified on Solaris.

Weinberg added that the capabilities in Trusted Solaris have been folded into Solaris 10. “Trusted Solaris has been used in government but has been separate from the standard Solaris,” he said. “We started this integration with Solaris 8, and Solaris 10 completes the move.”

James Dobson, system architect for Dartmouth College in Hanover, N.H., talked about the success the institution’s psychology department has had in using a version of Solaris 10. Pointing to the operating system’s improved interoperability, Dobson said, “We use multiple applications and platforms and Solaris 10 is working smoothly with all of these.

http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1005868,00.html

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • …
  • 61
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme