1209 issue
We are seeing the beginnings of an evolving security architecture standard approach, says Peter Stephenson, technology editor.
As we look at 2009, we see some really interesting developments.
With the start of our next year, we're looking for some signs of revitalization.
Palo Alto Networks, provider of firewalls for application visibility and control, has named Rene Bonvanie head of worldwide marketing. He formerly served as senior vice ...
RSA has partnered with First Data, a leading payment processor, to create a service that will enable First Data's retail customers to remove customer credit ...
WatchGuard Technologies, provider of unified threat management solutions, has teamed up with AVG to offer customers anti-virus protection. The virus direction and heuristic analysis capabilities ...
nuBridges has partnered with PGP to integrate its encryption technology into nuBridges Exchange managed file transfer and B2B gateway software solution. The integration will enable ...
The Livingston Group, a Washington, D.C. lobby, has launched a cybersecurity practice area. The move comes in light of reports that foreign governments and global ...
Avenda Systems, maker of network identity and access policy solutions, has teamed up with Great Bay Software to create combined endpoint discovery and network security ...
NetMotion Wireless, provider of mobile VPN solutions, has promoted Matthew Scott to VP of technical scales and support and Rob Mattson to VP of business ...
WinMagic, provider of full-disk encryption, has announced it will support Intel's Anti-Theft Technology. The integrated offering will combine data protection with Intel's tamper-resistant asset protection ...
The lack of integration of compliance tools often creates information silos, reporting nightmares and unknown security gaps.
Protection of intellectual property and corporate assets remains the overarching objective of physical and logical security teams...
CEOs and other business leaders may not know anything about security, but they are given credit for what they do know about how to motivate ...
With no funding or charter, the Conficker Working Group has proven that industry collaboration can be effective, reports Angela Moscaritolo.
While Wells Fargo no longer uses the Pony Express to communicate with customers, it still needs to guard messages, reports Greg Masters.
Despite the prosecution of hacker Albert Gonzalez, more needs to be done to secure credit card transactions, reports Deb Radcliff.
Our annual celebration of the top five influential IT security thinkers, as well as a look back at some of the most pressing trends and ...
Along with the benefits of SaaS, will come new risks and challenges, says Philippe Courtot, chairman/CEO, Qualys.
It's December and with the holidays upon us it's time to look back and look forward.
A recognition of products and services selected by Technology Editor Peter Stephenson and his SC Lab team in 2009 as Best Buy, Recommended and SC ...
There are some very strongly held opinions on how to execute access control.
This year's innovators have a contribution and a strategy for access control and each places the emphasis on a different aspect or technique.
BIO-key International has attacked two major problems with biometrics: cost and accuracy.
BIO-key International has attacked two major problems with biometrics: cost and accuracy.
There have been some changes in the marketplace that Fischer anticipated and had the technology ready to address.
Vision is the name of the game at Gemalto, followed closely by the level of research and development that turns vision into innovation.
I always am on the prowl for new and creative ways of testing and analyzing the confidentiality, integrity and availability of our enterprises and the ...
Today, there are very few things that the Mu products cannot test for vulnerabilities, and then go on and support detailed analysis.
Core Security has looked very closely at what professional penetration testers want beyond the ability to penetrate a network.
Getting a maverick to market and then dominating that market is a huge task.
Cyber Security Technologies addressed a perennial problem with computer forensics in law enforcement: backlog.
Venafi’s Encryption Director manages everyone’s encryption products in a single enterprise.
Fidelis started looking at the problem of data leakage not by looking at data leakage, but by looking at intrusion prevention.
Trusteer has taken an innovative approach to our number one criminal activity, identity theft, and made its solution available through initiatives with banks.
The selection this year may well end up defining the product type going forward.
SonicWALL has developed a new deep packet inspection technique that does not require the analysis engine to play an entire message stream before it can ...
The Palo Alto product has identified about 900 applications that it can manage directly.
How do you take a free open source product and turn it into a commercial product that people will buy?
Aerohive believes that the wired network is on the way out and the wireless on the way in.
This is one of those times when you just have to say, “Why didn’t someone think of this before? It’s brilliant.”
Agiliance offers a platform for its partners to which the partners add expert content.
The Altor VF virtual firewall is the product of both innovative thinking and marketing.