Websense secures the borderless enterprise with Web Security Gateway Anywhere
Websense has announced Web Security Gateway Anywhere, a web gateway that the company says delivers industry firsts in threat and risk prevention and deployment capabilities. It is designed to cope with the rise of borderless enterprises with more employees working remotely and more business operations being done via the web.
The company says it is the first secure web gateway with extensive coverage for applications and content types including “rich” internet applications, more than 7,500 Facebook applications, outbound malware, proxy avoidance and many others.
“The first and only secure web gateway to combine the power of on- premise deployment with the flexibility of a full SaaS with TruHybrid deployment and the only DLP and secure web gateway system to be unified on virtualised appliances.” said the company.
New cloud ready virtualisation solutions from PKWARE
The PKWARE Solutions for Virtualisation and the Cloud are said to provide unique benefits to each computing environment, according to the company. The PKWARE Virtualisation Solution protects the data, plugging known security gaps in virtual machine (VM) architecture, as well as measurably reducing the amount of data intrinsic with VM sprawl. The Cloud Solution secures data transfers and storage throughout the cloud, and is also said to reduce the cost of transferring and storing the data.
According to the company, PKWARE solutions ensure that the data is protected in transit and at rest within the cloud using file-level encryption. “Properly implemented data-centric encryption provides critical protection for sensitive information.” said Diana Kelley, co-founder and principal analyst of SecurityCurve.
F5 focus group assesses risks from politically motivated attacks
An F5 focus group of IT security professionals examined the WikiLeaks related DoS attacks of late 2010. The group acknowledged this was the first known large-scale attack to involve voluntary participation. Instead of having to rely on the exploitation of vulnerable machines to create a botnet, many people willingly turned over control of their machines to hackers.
With this approach, hackers can access a given machine’s full resources without needing to worry about being detected.. The group also looked at the political rather than financial motivation for these attacks.
Download F5 whitepaper on DoS: http://bit.ly/eJoLkn
Inform – Issue 5 | 2011 5
Check Point R75 adds key new security features
Check Point has introduced its new software release R75 based on the software blade architecture, which it says enables organisations to benefit from easy access to application control, identity awareness and intrusion prevention capabilities at multi-gigabit speeds, in a single solution.
According to the company, R75 enables businesses to gain greater visibility and control over data, web 2.0 applications, and mobile access – bringing organisations multi-dimensional security in a single, integrated solution.
New in Check Point R75 is the application control blade. This is said to deliver a differentiated approach to application control by providing a combination of robust security technology, user awareness and broad application control. Check Point says this is necessary for employees to utilise Web 2.0 tools without jeopardising the security of the enterprise.
The new blade integrates Check Point’s unique UserCheck technology to engage employees in the remediation process and enables IT administrators to tailor application usage policies based on level of risk and user needs. “It delivers unmatched application visibility by leveraging Check Point AppWiki, the world’s largest application library, now with over 100,000 Web 2.0 application and widgets.” said the company.
| Page 2
| Page 3
| Page 4
| Page 5
| Page 6
| Page 7
| Page 8
| Page 9
| Page 10
| Page 11
| Page 12
| Page 13
| Page 14
| Page 15
| Page 16
| Page 17
| Page 18
| Page 19
| Page 20
| Page 21
| Page 22
| Page 23
| Page 24
| Page 25
| Page 26
| Page 27
| Page 28