Crisis malware doesn’t affect most VMware hypervisors
A few days ago Symantec researchers revealed that the Crisis malware is not limited to attacking Mac machines, but has the ability to infect devices running Windows and …
A few days ago Symantec researchers revealed that the Crisis malware is not limited to attacking Mac machines, but has the ability to infect devices running Windows and …
Dell launched its Desktop Virtualization Solutions for Government (DVS-Gov), a secure solution that helps government agencies manage “geographic sprawl” through …
While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to …
Virtual Machine Servicing Tool (VMST) 2012 is designed to work with System Center 2012 -Virtual Machine Manager (VMM), System Center 2012 Configuration Manager and Windows …
Tenable Network Security announced SecurityCenter Continuous View, a vulnerability management solution that provides real-time, continuous vulnerability, configuration, and …
In response to such trends as growth of mission-critical data, the proliferation of virtualization and cloud within the data center, and the erosion of organizational …
Sophos announced Sophos UTM 9, specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. It provides complete security …
Check Point introduced Check Point Virtual Systems, that allow customers to secure multiple network segments by selecting any combination of Check Point software blade …
VKernel released the integration compatibility between its vOPS Server product line and Microsoft System Center 2012. This integration adds capabilities to Microsoft System …
It might seem like a strange question, but I wonder how many readers are running a honeypot network in their infrastructure? If you’re not then let me be the first to …
Cryptzone released AppGate MOVE (My Own Virtual Environment), a USB flash drive that provides a portable way to access information and applications securely from any computer. …
Technology trends such as BYOD, video and virtualization are rapidly consuming network capacity and capabilities, and 45 percent of the enterprise networks assessed during …