Please turn on your JavaScript for this page to function normally.
Nmap 5.00 released

Nmap (“Network Mapper”) is a free and open source utility for network exploration or security auditing. Version 5.00 is the first major release since 4.50 in 2007, …

New hardware security module from Thales

Thales announced Thales nShield Connect 6000, a fast network-attached hardware security module and the only one to offer dual, hot-swappable power supplies. HSMs are widely …

New software filtering client for laptops

SmoothWall announced the release of Mobile Guardian – a new software filtering client, designed to prevent roaming laptop users from accessing inappropriate and …

BitDefender for HTTP proxy for Linux released for beta testing

BitDefender announced that BitDefender for HTTP Proxy for Linux is available for beta testing. It offers advanced features, including: Real-Time Scanning of Internet Traffic: …

Endpoint security from Check Point

Check Point announced Check Point Endpoint Security R72, a new version of their single agent for endpoint security. New Check Point WebCheck browser security protects …

Juniper’s adaptive threat management solutions for distributed enterprises

Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, deliver security at scale that is identity aware and application aware, …

Security code review service for threat identification

Comsec Consulting launched CODEFEND, a new application security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat …

Users voice key factors of virus protection

In an online survey conducted during May 2009, 9325 surfers told IT security specialist Avira about the criteria they use when choosing their virus protection. International …

First vascular recognition solution to earn certification

Fujitsu announced that the Fujitsu PalmSecure vascular biometric authentication technology has been certified under the International Common Criteria for Information …

85% of US organizations hit by one or more data breaches within the last 12 months

PGP Corporation announced the results from The Ponemon Institute’s fourth annual study on encryption usage in the enterprise – The 2009 Annual Study: U.S. …

Trend Micro’s protection for virtual machines

Trend Micro is expanding its virtualization security portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines …

Firewall management app turns firewalls back into network security devices

Pressures to keep network traffic flowing through firewalls combined with fear and anxiety over causing interruptions to business processes has created a situation where …

Don't miss

Cybersecurity news