Archive

Archive for October, 2006

Bridging the Telecoms Skills Gap

October 31st, 2006
Comments Off on Bridging the Telecoms Skills Gap

The telecoms sector is booming once again, following five years of relative dormancy. The evidence is everywhere. In the UK alone there’s BT’s 21CN, which will see over 4500 exchanges swapped out in the coming years. Over the summer of this year, we saw the rollout of the UK’s first HDTV-ready, 10GB Ethernet infrastructure for Sky’s triple-play services. And these ambitious projects are mirrored across Europe, as telcos and operators look to replace or upgrade the 1980s technology in their networks.
Read more…

Uncategorized

Best Practice for Database Encryption Solutions

October 30th, 2006
Comments Off on Best Practice for Database Encryption Solutions

Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. Encryption at the database level, versus application level and file level has proved to be the ideal method to protect sensitive data and deliver performance.
Read more…

Uncategorized

How to keep your VoIP net safe

October 29th, 2006
Comments Off on How to keep your VoIP net safe

One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.
Read more…

Uncategorized

User tricks, security treats

October 29th, 2006
Comments Off on User tricks, security treats

Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you´re going to scare them into security compliance you may need to get a little bit spooky yourself. Have a few treats up your sleeve to return for these goblins´ sinister tricks.
Read more…

Uncategorized

10 Steps to More Secure Wireless

October 27th, 2006
Comments Off on 10 Steps to More Secure Wireless

We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail. Better yet the neighbor who doesn’t want to pay for their own internet. Even worse, having your internet shut off or becoming sued for downloading illegally items. Here are some tips to keep your internet more secure.Read Full Story

Uncategorized

Comodo and Globaltrust Italia S.p.a. partner to deliver mutual authentication and identity assurance solutions

October 25th, 2006
Comments Off on Comodo and Globaltrust Italia S.p.a. partner to deliver mutual authentication and identity assurance solutions

Comodo, a leading global Certification Authority and provider of Identity and Trust Assurance Management solutions, announces today that Comodo and GlobalTrust Italia S.p.a. have entered into a partnership to enable GlobalTrust to offer ID protection for the highly demanding needs of large and complex financial institutions.
Read more…

Uncategorized

BT acquires Counterpane Internet Security

October 25th, 2006
Comments Off on BT acquires Counterpane Internet Security

BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.
Read more…

Uncategorized

Meru Networks Positioned in Visionaries Quadrant of Latest Wireless LAN Magic Quadrant

October 25th, 2006
Comments Off on Meru Networks Positioned in Visionaries Quadrant of Latest Wireless LAN Magic Quadrant

Meru Networks, the global innovation leader in wireless infrastructure for the All-Wireless Enterprise, today announced that it has been listed in the Visionaries Quadrant in the Wireless LAN version of Gartner´s well-known industry report, the Gartner Magic Quadrant1. The new report, released October 6, 2006, evaluates wireless LAN vendors based on their completeness of vision and ability to execute.
Read more…

Uncategorized

Perdemia updates Permission Analyzer

October 25th, 2006
Comments Off on Perdemia updates Permission Analyzer

Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.
Read more…

Uncategorized

Mirage Networks to Share NAC Insights at ISSA Security Leadership Conference

October 25th, 2006
Comments Off on Mirage Networks to Share NAC Insights at ISSA Security Leadership Conference

Mirage Networks(R), developers of award-winning Network Access Control (NAC) technology, will share technology insights at next week’s ISSA Secure San Diego conference to help organizations successfully secure and protect their mission-critical networks against threats created by unmanaged, out-of-policy and infected endpoints.
Read more…

Uncategorized