Search results for: software

NAI Unveils ‘InfiniStream Security Forensics’ Solution

InfiniStream Security Forensics is a forensics analysis solution that allows enterprise customers worldwide to reconstruct, understand and prevent harmful network activity and security events. The InfiniStream solution includes the following key components: Capture Engine – The InfiniStream capture engine is a hardware appliance that enables network and security managers to continuously capture and store network traffic at gigabit speeds. The capture engine can index and warehouse 2.9 terabytes of traffic, which equates to roughly 2.5 … More

Cyber-Ark Unveils Inter-Business Vault 2.0

Provides a Powerful, Yet Transparent, Security Solution to Protect and Share Vital Company Information Across the Extended Enterprise Dedham, MA – February 10, 2003 – Cyber-Ark Software Inc., the information security software company that invented and markets Vaulting Technology, today unveiled Inter-Business Vault 2.0. Inter-Business Vault (IBV) provides everything organizations require to create safe havens for protecting and sharing vital business information across the extended enterprise. With the addition of several new powerful Gateways, Version … More

Partners HealthCare Chooses Neoteris to Deliver Instant Secure Access to Medical Information

Partners HealthCare to Provide its Diverse User Community with Secure Access to Patient Records and Information via Neoteris IVE, Eliminating Complexities of VPN Access SAN DIEGO – Feb. 10, 2003 – Neoteris, the leading provider of instant virtual extranet (IVE) products, today announced that Partners HealthCare, an integrated health care system that provides services from preventive primary care to long-term care, is rolling out Neoteris’ IVE to deliver secure access to healthcare applications and patient … More

Interview with Charles R. Elden, co-author of “Wireless Security and Privacy”

Charles R. Elden is an independent security consultant. He has worked as a manager and software security consultant with Cigital’s Software Security Group. He has experience performing communication and software systems risk analysis and risk management. Previously, he worked for the Central Intelligence Agency for 12 years and has worked for more than 11 years in the Directorate of Science and Technology’s Office of Technical Services. He is the co-author of “Wireless Security and Privacy: … More

ActivCard Announces Final Results of Exchange Offer for Reincorporation

FREMONT, Calif. and SURESNES, France, Feb. 7 /PRNewswire-FirstCall/ — On February 4, 2003, ActivCard Corp. (Nasdaq: ACTI; Nasdaq Europe: ACTI) and ActivCard S.A. announced the expiration and closing of ActivCard Corp.’s registered exchange offer for all of the outstanding common shares and American depositary shares (“ADSs”) of ActivCard S.A. The exchange agents have advised ActivCard Corp. that 24,409,937 common shares and 15,417,729 ADSs were tendered and not withdrawn in the exchange offer prior to its … More

Managing Information Security Risks: The OCTAVE Approach

This book is a powerful documentation on CERT/CC’s Operationally Critical Threat, Asset, and Vulnerability Evaluation. It offers all the information you need to know while thinking about, or starting, the implementation of the OCTAVE into your organization. More

Sophos Reports Record Momentum in 2002

Sophos, a world leader in corporate anti-virus solutions, today announced record momentum in 2002. Sophos reported record results for last fiscal year, where it experienced nearly a 40% growth rate – more than twice the rate of analyst expectations for the overall anti-virus market. The company attributes this growth to several key factors including its commitment to execution, product development, its extended protection through partners and its growing customer base of well over 20 million. … More

Trend Micro Delivers Enterprise-level Outbreak Prevention and Damage Cleanup Services for Networked Computers and Servers

OfficeScan(tm) and ServerProtect(tm) further extend service capabilities to support Trend Micro Enterprise Protection Strategy Cupertino, CA – February 5, 2003 – Trend Micro Inc (TSE: 4704; Nasdaq: TMIC), a leader in network antivirus and Internet content security software and services, today announced the availability of new versions of its security software for network servers and client systems. To support the company’s Enterprise Protection Strategy, the products include new technology enabling the prevention of virus and … More

Interview with Dr. Nicko van Someren, CTO of nCipher

nCipher’s CTO Dr. Nicko van Someren leads the research team and directs the technical development of nCipher products. Nicko has 20 years of experience in cryptography, software and hardware product development, and holds a doctorate and First Class degree in computer science from Trinity College, Cambridge, UK. Introduce nCipher. When was the company started? How did it evolve? My brother Alex and myself founded nCipher in 1996 to exploit the need for secure e-commerce transactions … More

iLottery System Goes Mobile

Effective Solution and Diversinet Partner for Secure Mobile iLottery Solution TORONTO, Canada, February 4, 2003 – Diversinet Corp. (NASDAQ SmallCap: DVNTD), a leading provider of secured mobile solutions, and Effective Solution Ltd. (ESL), a developer of lottery and pari-mutuel software systems providing cash and account betting through both wired and wireless devices, today announced that they have signed an OEM/VAR license agreement to develop and sell a secure mobile lottery solution. Under the terms of … More

iPass Improves its Enterprise Connectivity Offerings For PDA Devices and Mac OS X

LONDON, UK – Building upon its virtual network operator capabilities and experience in delivering enterprise connectivity services across multiple network technologies, iPass announced today it has upgraded capabilities for two versions of its smart client: iPassConnectâ„? 2.0 for PocketPC 2002 and iPassConnectâ„? 2.3 for Mac OS X. These platforms support wireless and wired broadband connections and can provide mobile professionals enhanced productivity with secure global access to corporate network resources. “Today’s enterprise users want the … More