SEC Charges Wyly Brothers With Illegal Stock Trading
Sam and Charles Wyly, longtime computer industry figures who sold Sterling Software to Computer Associates for $4 billion in 2000, are charged with using secret overseas accounts to generate more than $550 million in illegal stock trades.
A Small Step For VMware, A Giant Leap For iSCSI
On July 13, VMware announced the introduction of vSphere 4.1 to "advance the foundation for cloud computing." Advancing the foundation of cloud computing is then broken down into five sets of enhancements. Within the category of enhancements called "increased performance through open integration with storage environments," lies a diamond in the rough. It's where you find that vSphere 4.1 enables 10Gb iSCSI hardware offload.
Network-Attached Storage User's Guide
Features on the latest NAS devices transform them into full-featured, multi-purpose computing devices which can act as media, print, and file servers, surveillance devices, and Web hosts.
Global DataGuard Unveils Next Generation 10Gb Network Behavior Analysis And Intrusion Detection/Prevention Modules
Global DataGuard, the premier provider of network behavior analysis-based (NBA) Unified Enterprise Security (UES), today announced the availability of 10Gb security devices to meet the growing demand of customers moving to higher speed networks. The Detection + Prevention Module (DPM) and Behavioral Correlation Module (BCM) are among the first appliances to utilize the next generation Xeon hardware platform, providing up to 2.5 times more memory bandwidth and twice the energy efficiency of other
Dell Leads Trio Of Partners Offering SMB Security
Dell is partnering with Juniper Networks and a security services firm called SecureWorks to offer a portfolio of solutions aimed at the small-to-medium-sized business market, which is increasingly facing the same security issues as enterprises without the same budgets. Dell announced Wednesday that it is introducing the Dell KACE K1000 Management Appliance line that combines general system management features with specific end-point security features, such as vulnerability assessment and remedia
IP Addresses Predicted To Be Exhausted In 2011
The current IPv4 protocol has fewer than 231.5 million addresses left, but the industry has been slow to adopt IPv6, which accommodates virtually unlimited unique identifiers. With less than a year's worth of Internet addresses left, the call for the technology industry to move faster to adopt the next-generation Internet protocol is growing louder.
Verizon-Secret Service Breach Report Focuses On External Attacks
Insiders were at least partly responsible for nearly half the data breaches investigated by Verizon Business and the U.S. Secret Service in 2009, but external attacks continue to account an overwhelming majority of records stolen, according to the 2010 Verizon Data Breach Investigation Report. The third annual report is the first to include data from the Secret Service, which accounts for a substantial increase (26 percent) in reported insider attacks over the previous year. However, more than 1
Airwide Solutions Unveils AirMessenger Rapid Service Platform
Airwide Solutions, a provider of next-generation mobile messaging infrastructure, applications and solutions, today announced a new offering designed to help operators cost-efficiently and rapidly launch core mobile messaging services or new applications, all while enhancing revenue and profitability. AirMessenger Rapid Service Platform (RSP) is applicable for operators launching applications, like mobile banking services, or for launching core network services, such as SMS and MMS. Using AirMes
AT&T Announces New Managed Security Features
Building on its position as a leader in managed security, AT&T, a leader in managed cloud based security, today has announced two separate enhancements to its suite of cloud-based security services - the launch of AT&T Security Center, a new Web-based security administration tool that is accessible via the AT&T BusinessDirect Portal, as well as enhancements to AT&T Distributed Denial of Service (DDoS) defense protection.
Request For Information: Data Center Networking
In the coming months, I am going to be spending a lot of time getting up close and personal with networking vendors' data center product sets. Jim Metzler and I are working on a data center networking RFI that Network Computing will publish, along with the vendor responses, in October. Jim and I are also going to present the results at the Interop NY show in October. I am looking forward to developing the RFI and reviewing the responses. In the last two years, there have been a ton of changes in
Insecurity On The Go
Thanks to laptops, smartphones, iPads, and other new mobile devices, our enterprises now extend to the local coffee shop, hotels and even cars on the interstate and commuter trains. Organizations let users purchase their own devices and connect them to the enterprise in the name of productivity, but this policy also introduces risks. And IT shops know it. According to a recent InformationWeek Analytics survey on mobile device management (MDM), the number of respondents citing security as the pri
Acme Packet Announces SBC OEM Software Program
Acme Packet, the leader in session border control solutions, today announced the Powered by Acme Packet Program. Designed to enable IP communications solutions providers to embed Acme Packet's Net-Net OS-E session border controller (SBC) software in network elements at the enterprise IP border, the new initiative extends the reach of Acme Packet's market-leading session border control solutions to small/medium enterprise sites and small contact centers. The program enables IP communications infr
Oracle's New Identity Management Suite Adds Sun Technology
Enterprise software giant Oracle has announced a new identity management suite that incorporates some of the technology from its recent acquisition of Sun Microsystems in the service of application security. Oracle Identity Management 11g consists of as many as nine different components that perform such tasks as identity management, access management, single sign-on capability, fraud prevention and administrator system management control. The suite works with Oracle Fusion Middleware 11g, the c
LISP's Future Is Not In The Data Center
LISP (Locator/Identifier Separation Protocol) is an IETF draft protocol that separates location information from host information on the Internet. The essential problem that LISP is designed to solve is the cost and viability of increasingly large Internet routing tables. As a side benefit, LISP is also touted as addressing the lack of flexibility and mobility in Internet routing architectures that limit the ability of an enterprise, or even an individual user, from moving providers or locations
ExOS 5.5 Scales Up WAN Optimization And Intelligent Acceleration
Exinda, a global provider of WAN optimization solutions, today introduced the ExOS 5.5, the latest generation of its ExOS software for its complete family of WAN Optimization appliances. ExOS 5.5 software release resolves many of the traffic management issues that network administrators face today. By ensuring the optimal use of available bandwidth and easy diagnosis and resolution of network problems, ExOS 5.5 enables education institutions, small and medium businesses, local governments and ot
Visa Releases New Guidelines For Protecting Card Data
Visa has released guidelines on tokenization to help merchants and card processors better protect customer credit card data and potentially reduce the burden of complying with PCI rules. Tokenization transforms a credit card number into a random number that can be associated with the account number but can't be used for transactions. Merchants and retailers often have to store customer card data for functions such as customer refunds or voiding a purchase. By using tokens instead, merchants and
Signing The DNS Root Is Only One Step Forward
The DNS root zone was signed on July 15th, 2010. Did you feel it? Did you even notice? The root zone of Internet is now more secure, signed cryptographically w/ DNSSEC. Unless you are really focused on DNS, you probably didn't notice. Frankly, this is a milestone for ICANN and friends, but it's not particularly actionable today or the near future. Many other things have to happen before DNSSEC becomes useful for most of us, such as .com and .net being signed, registrars start supporting DNSSEC,
Zscaler Adds Hosted Email Security To Web Protection Service
Hosted Web security vendor Zscaler has added a hosted e-mail security service, featuring anti=spam, anti-virus, policy-based encryption, distribution control and forensics. Zscaler is touting the integration of the two services, claiming stronger security, unified policy and common management controls. A number of security vendors typically offer both hosted Web and e-mail security services. There's some natural synergy. Many Web-based attacks originate with spam or phishing messages that lure u
IDS Best Practices
Intrusion detection systems (IDSs) have a bad reputation. Yes, they can be noisy and generate lots of false positives, both the network- and host-based products. But they are very useful to have at the WAN edge and within your LAN, and you can correct the signal-to-noise ratio through proper tuning and by understanding your environment. In fact, knowing your environment is the foundation of everything we as security professionals do. If we don't understand what data flows between two points or
Radio IP Announces New Release of Its ipUnplugged Mobile VPN Solution
Radio IP Software, Inc., a leading developer of advanced mobile Virtual Private Network (VPN) solutions, announced today the new release of its ipUnplugged mobile VPN solution for business-critical communications. The new version adds several enhancements including support for PDA on Mobile Windows, FIPS 140-2 compliance, validated AES 256 encryption, and simplified user and license management. Leveraging these enhancements, ipUnplugged was thoroughly tested by Celestica, a global leader in the
Barracuda Adds Virtual Options For Spam Blocking And VPN
Barracuda Networks has introduced the Barracuda Spam & Virus Firewall Vx and the Barracuda SSL VPN Vx; the latter refers to secure-socket-layer virtual private network, an industry standard for accessing a corporate network remotely. The latest additions to Barracuda's virtual portfolio supplement its existing virtualization offerings such as the NG Firewall and Purewire Web Security Service. Other virtual offerings for data protection, application delivery, as well as other security categories
The FCoE Market: Which Model Wins?
As Fibre Channel over Ethernet moves from lab attraction and proofs of concept into real market acceptance, the big question is will the emerging FCoE market be more FC or more E? While corporate data centers worldwide have both Fibre Channel and Ethernet networks, the markets for these two networking technologies are very different, and the established players in each are trying to make the nascent FCoE market in their own images.
Cisco FabricPath: Enhancing TRILL: Standards Compatible
Cisco's announcement about FabricPath at CiscoLive cleared up the confusion about what FabricPath actually is. Cisco indicated that Nexus customers would have to choose between Cisco's own layer 2 multi-path protocol or TRILL, the other multi-path bridging standard that Cisco is supporting. A choice like that could cause lock-in to Cisco's proprietary protocol and product line. Cisco was also light on details about how FabricPath ehnahces TRILL. We asked Cisco for clarification on these points.
Netgear Switch Manages Multimedia Traffic
A media friendly line of network-attached storage products was announced along with the 8-port Gigabit PoE ProSafe Smart Switch that lets business add VoIP, video, wireless LAN service.
3G C-NICs Address Mass Migration To 10GbE
The long awaited mass migration from 1GbE to 10GbE technology is underway as IT organizations extend 10GbE outwards from the core of the data center to the edge. That translates to a need for a new generation of NICs that can deliver 10GbE performance today and converged network connectivity tomorrow. The days of application-specific servers are waning as dense compute nodes become the norm. New server deployments typically include multi-processor, multi-core servers heavily loaded with guest op
Pervasive Software Releases Pervasive DataCloud Summer 2010
-Pervasive Software Inc., a global leader in on-premises and cloud-based data integration software, today announced a richer array of security options and an enhanced management console with its Summer 2010 update to Pervasive DataCloud 2. The update to Pervasive DataCloud 2, a secure and reliable on-demand platform-as-a-service powered by Amazon Web Services, LLC (AWS), has been fully implemented and the new capabilities are automatically available to the more than 200 Pervasive DataCloud users
Watchdox Secures Sensitive Documents On Android
Confidela, a service provider that secures sensitive documents, is expanding to the mobile space by offering its service on the Google Android platform. Android 2.2 Froyo. The latest version is the first mobile operating system for which WatchDox, previously available only online, can now be used. The application allows only qualified people to view documents and restricts who can copy, print or forward them. WatchDox starts at $50 a month for an individual subscriber. For larger enterprises the
NEC Joins The IOV Party
NEC has announced an extension of their ExpEther PCIe over Ethernet switch technology that will come to virtualize I/O resources so that they can be shared simultaneously between servers. The new IOV solution adds scalability, better quality of service while delivering on the promise of I/O on-demand, reducing capital expenses by half and power consumption by 30 percent. By combining PCIe and Ethernet, NEC makes I/O Virtualization (IOV) available and relevant to the mass data center market.
Wire-Once: Strategy or Pipedream?
With the rise of 10Gbps Ethernet and the converged data and storage network being talked about these days, we are hearing the siren's song of wire-once networking. While I love the idea of wire-once, I've been building networks long enough have heard this song before. Advocates of technologies from 10Base-T to ATM have all claimed you could wire once and then relax and live the simple life. As the saying goes, if it sounds too good to be true, it probably is.
Putting The Catalyst 6500 In Its Place
The 6500 is a workhorse in the core and the data center. Network admins love to hate it and hate to love it. The variety of blades that can be inserted for in switch processing makes the platform applicable to many different network requirements. It's also an old platform and is getting pretty long in the tooth. With a paltry 80Gbps (full duplex) interconnect to the back plane, the 6500 simply isn't suited to stand as a next generation core data center switch. It's time to start thinking about p
NETGEAR Delivers Higher Business Network Performance With New ProSafe Smart Switch
Inc., a worldwide provider of technologically innovative networking solutions for businesses, homes and service providers, today announced the addition of a NETGEAR ProSafe Smart Switch to deliver higher network performance for businesses, without the cost and complexity of traditional enterprise vendor switches. The NETGEAR ProSafe 8-port Gigabit PoE Smart Switch (GS110TP) enables businesses to quickly, easily and cost-effectively handle the explosive growth of voice, video, and data traffic ex
Managed File Transfer Asserts Data Governance In Transit
Moving staggering volumes of data is the lifeblood of business, commonly in large files, from massive batch file transfers of transactional data to that really big e-mail attachment that gets kicked back because it exceeds the corporate attachment size limit. Enterprises are challenged to scale their mass file transfer capabilities to meet increasing business demands -- new partners, new customers, new business initiatives -- while assuring security and exercising governance over the movement of
AT&T, Verizon Receive Billions From FCC Phone Fund
Figures released by a congressional committee as part of the FCC reform process for the Universal Service Fund, indicate the two carriers have collected more the $2.5 billion in the past three years.
I've been seeing many organizations struggle with malware lately, so I thought I'd offer a refresher on dealing with malicious software and all the ways it can creep into your organization. Removing malware and rebuilding infected systems eats up IT time and resources (not to mention the potential fallout from any stolen information), so your best bet is to prevent the compromise in the first place. Here's how.