Expert Analysis
Content tagged with Networking posted in August 2011
<<   <   Page 2 / 2
Check Point Introduces New Firewall Appliances
News  |  8/3/2011  | 
Check Point Software Technologies introduced two new blade form factor firewall appliances along with an upgrade to its software to manage increasingly complex security environments. Check Point says the new 61000 and 21400 model firewall blades deliver not only firewall protection, but also deliver intrusion prevention, data loss protection and application control.
Qualys Announces User Interface For Vulnerability Management Services
News  |  8/3/2011  | 
Compliance software-as-a-service vendor also upgrades its Web application scanning service.
Core Impact Adds Mobile Device Exploits, Widens Metasploit Integration
News  |  8/3/2011  | 
Core Security has introduced mobile device testing and measurement in the latest version of its Core IMPACT penetration testing software. Version 12 also improves Core' integration with the popular open source Metasploit Framework pen-testing tool.
Qualys Announces UI For VM Services, Upgrades Web Application Scanning Service
News  |  8/2/2011  | 
Qualys has announced a new user interface to streamline management of its QualysGuard suite of vulnerability management and compliance SaaS offerings. Qualys also announced general availability of version 2 of its Web Application Scanning Service (WAS) and a new release of its Consultant Edition.
Ricoh Picks Vidyo Technology For Portable Videoconferencing System
News  |  8/2/2011  | 
Ricoh, best known for printers and copiers, is getting into the growing UC market, adopting scalable video coding technology from Vidyo for a portable videoconferencing system. The Ricoh Unified Communication System P3000 model delivers high-definition, multipoint videoconferencing, as well as the ability to share documents and photos, using a 3.5-pound portable room system.
Today's Deal: Google Buys Dealmap
News  |  8/1/2011  | 
Snubbed by Groupon, Google puts itself on daily deals map with deal for special offers aggregator.
5 Marketing Blunders That Twitter Could Have Stopped
News  |  8/1/2011  | 
Twitter helped save the debt ceiling deal, White House says. Could it have prevented New Coke or Microsoft Bob?
Black Hat Will Once Again Show Our Security Weaknesses
Commentary  |  8/1/2011  | 
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.
eEye Improves Vulnerability Prioritization Capabilities
News  |  8/1/2011  | 
The new release of eEye Digital Security’s CS Management product improves enterprise ability to prioritize remediation and mitigation of known vulnerabilities. Version 2.5 of the vulnerability management offering also adds support for mobile devices and free patching for select non-Windows applications.
<<   <   Page 2 / 2


Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed