Tuesday, December 08, 2009

iPhone winning over some corporate security skeptics

Novell vows first identity management for cloud, virtualized apps; Virtual satellite cluster technology gets $75M blast
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
iPhone winning over some corporate security skeptics

Apple's iPhone is slowly but surely winning over some enterprise security skeptics. As a result, it's now showing up alongside, or instead of, Research in Motion BlackBerries and Microsoft Windows Mobile handsets, despite the fact Apple offers none of the security and management features that are hallmarks of those two platforms. Read full story

Related News:

Novell vows first identity management for cloud, virtualized apps
Virtualization and cloud computing has taken off, despite strong lingering concerns over how companies can secure and manage those apps and data. Novell Inc. says it can help.

Virtual satellite cluster technology gets $75M blast
Scientists building the complex space technology that will replace traditional spacecraft with clusters of wirelessly-interconnected satellite modules got an almost $75 million infusion from the

How to fight malware
Tests of five Web security gateways reveal that performing inline inspection of network traffic is a must, as is querying cloud-based databases of the latest malware. The current crop of anti-malware tools offers strong protection against spam, spyware, phishing, botnets, rootkits, viruses and other Internet-borne attacks.

Network IPS tests reveal equipment shortcomings
An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective in warding off attacks against Microsoft, Adobe and other programs.

How we tested antimalware gateways
We primarily looked for the ability to identify and block malware (such as keystroke loggers, browser hijackers, bots, adware, rootkits, dialers, data miners and trojans). The ability to correctly recognize and thwart phishing attempts was also important. We established a variety of corporate policies regarding Internet access, and we expected the gateway products would enforce them.

TCP RESET: Pros and Cons
A clever anti-malware gateway can achieve zero latency by using a span/tap port to inspect Internet traffic for malware and malware references (in contrast to inline inspection).

How to remove rootkits by hand
Manually removing rootkit-based malware can be extremely difficult. You can't delete the offending Registry entries because the malware process is running. You halt the malware process, but Windows restarts the malware before you can delete the Registry entries. Many rootkits also set the Registry entries' owner to someone other than the user, thus complicating things further.

DoorStop X Security Suite 2.3
A firewall by its very definition is, "any barrier that is intended to thwart the spread of a destructive agent." When it comes to your Mac, that "destructive agent" is anyone on the Internet or your local network who wants to gain unauthorized access to your computer and data. DoorStop X Security Suite is a collection of three tools designed to leverage your Mac's built-in firewall, help you understand how others are trying to access your computer, and to help you understand how to keep your Mac secure.

20 mobile trends and future technologies
Spokespeople from Info-Tech Research Group Ltd., Advanced Micro Devices Inc., Sony Corp. and Research in Motion Ltd. provided food for thought on upcoming uses for mobile devices at a Technology Town Hall meeting in Toronto Tuesday.

Fortinet secures remote and branch office environments
Fortinet, a network security and unified threat management (UTM) solutions provider, has launched a new FortiGate multi-threat security appliance for remote office and branch office (ROBO) environments.

Today from the Subnet communities

On Cisco Subnet: Oracle, Sun, and the Identity Management Waiting Game and An Early Gift for MySQL servers; On Microsoft Subnet: Running Windows 7 on a Mac; On Google Subnet: Will Google be left in the dark over white spaces?

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.


FISMA Prescriptive Guide
Learn how Tripwire helps federal agencies, as well as the organizations and contractors that store, process or transmit federal information. The FISMA Prescriptive Guide contains case studies from three fictional federal agencies, each capturing the perspective of a key stakeholder in the FISMA compliance process.
Click here.

 

December 08, 2009

MOST-READ STORIES

  1. FCC examines Verizon's doubling of early termination fees
  2. Six best BlackBerry accessories and add-ons for $100 total
  3. 2009's most awesome Android apps
  4. Thanksgiving Webcam promo leads to malware
  5. Cisco wins Tandberg with 91.1% stake
  6. Great tech gadgets: When spouses collide
  7. Microsoft releases next two pieces of Forefront security suite
  8. Is Apple testing a new iPhone model?
  9. Skype opens SIP beta program
  10. As IBM sales suffer, now's the time to buy a new mainframe

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment