{"id":1465,"date":"2006-02-13T00:00:00","date_gmt":"2006-02-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/13\/sun-to-unveil-security-offerings\/"},"modified":"2021-12-30T11:39:26","modified_gmt":"2021-12-30T11:39:26","slug":"sun-to-unveil-security-offerings","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/13\/sun-to-unveil-security-offerings\/","title":{"rendered":"Sun to unveil security offerings"},"content":{"rendered":"<p>Sun Microsystems is expected to announce two security initiatives in the United States, one introducing a form of encryption for its next-generation Sun Java System Web Server and another that re-slices the way it delivers security features for Solaris.  As part of its initiatives, Sun plans to introduce Sun Java System Web Server 7.0 with support for Elliptic Curve Cryptography (ECC).  The company also plans to nix its tradition of offering Solaris in two flavours&#8211;one for the masses and another version with extensive security enhancements that are targeted to government agencies, financial institutions and health organisations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;With this announcement, we&#8217;ll have more security features in our Sun Java Web Server,&#8221; said Brian Leonard, Sun&#8217;s marketing director of Web tier products.  Sun Java System Web Server 7.0, with its support for ECC, is expected to be released in July, Leonard said.<\/p>\n<p>The company is also expected to announce plans next week to change the way it delivers security to organisations and agencies that deal with highly sensitive information, said Chris Ratcliffe, director of Sun&#8217;s Solaris marketing.  Sun plans to introduce its Solaris Trusted Extensions, which encompasses the remaining 15 percent of the security features left out in Solaris 10.  He noted organisations that are mandated to use higher levels of security will likely be the ones to subscribe to the Trusted Extensions support service.<\/p>\n<p>http:\/\/www.zdnet.com.au\/news\/software\/soa\/Sun_to_unveil_security_offerings\/0,2000061733,39237991,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1465","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1465"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1465\/revisions"}],"predecessor-version":[{"id":3952,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1465\/revisions\/3952"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}