37
Secure mobile VPN for iPhone
® and iPad® and iPad ®
Cryptzone’s Appgate solution extends mobile support with the release of a mobile client for Apple iPhone®
. Users are now able to log
securely into the network and safely gain access to corporate information. More “intelligent” and versatile smart phones virtually eliminate the need for many mobile workers to carry a laptop. However security concerns have deterred some IT departments from supporting a new generation of roaming information workers. With Cryptzone’s Appgate Secure Mobile VPN, organizations can be confident that their smart phone users have secure access to corporate information and network applications quickly and easily.
The latest mobile client
enhances the wide range of mobile platforms already supported by Cryptzone’s Appgate Security Server, offering a real opportunity for people to work more productively and securely whilst on the move.
ActivIDentity joins HID Global
HID Global has announced the completion of its parent company ASSA ABLOY’s acquisition of ActivIDentity. The acquisition will expand HID Global’s logical access offering and create a unique portfolio of converged physical and logical access solutions. These solutions will enable existing and future enterprise, financial services and government customers to meet their security and compliance requirements with a broad range of user authentication products. ActivIDentity’s solutions are used to confidently establish a person’s identity for digital interactions, also known as logical access control. There is growing demand to combine this capability with the kinds of solutions that HID has traditionally offered for physical access control and secure card issuance. These converged solutions will enable a single smart card to support multiple authentication methods and enforce policies throughout the enterprise, providing multilayered security across company networks, systems and facilities.
Newly discovered threats
Stonesoft has announced the discovery of new, advanced evasion techniques (AET) that can pose a serious threat to existing network security systems worldwide. Discovered in Stonesoft’s research labs in Helsinki, AETs essentially provide cyber-criminals with a master key to access any vulnerable systems and as a result, companies may suffer significant data breach including the loss of confidential corporate information.
Stonesoft cautions that hackers may already be using AETs in advanced, targeted attacks. With only a select few products available to provide protection, organisations may be challenged to protect their systems quickly. The best defence against the dynamic and
ever-evolving nature of AETs is delivered through flexible, software-based security with remote update and centralised management capabilities, such as Stonesoft StoneGate network security.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43