Data Center Facilities Management: Uptime Institute to Release New International Standard 14. May 2010 by Thomas Jannot The Uptime Institute today announced it has developed a new standard that defines and classifies the risk factors to a data center’s sustained uptime. The new standard – ‘Tier Standard: Operational Sustainability’ – will be released July 1, 2010. The Operational Sustainability Standard works in tandem with Uptime’s international Tier Classification System. This system ought …
MXI Stealth HD Series: USB Hard Disk Receives FIPS 140-2 Level 3 Validation 12. May 2010 by Thomas Jannot MXI Security today introduced the Stealth HD Series of encrypted USB hard drives. Replacing the Outbacker MXP Series, the Stealth HD Series is powered by MXI Security’s Bluefly Portable Security Processor. Bluefly recently received FIPS 140-2 Level 3 validation (Certificate number 1269), making the Stealth HD Series the first and only USB hard drives to …
Parascale Cloud Storage Software 2.5 Beta: Cloud Scale Data Protection and Security 10. May 2010 by Thomas Jannot Parascale, Inc. today announced the next generation cloud storage platform with advanced features for cloud scale data security, protection and accessibility. Release 2.5 of Parascale Cloud Storage software also ought to include features to efficiently address ‘big data’ requirements by enabling data services and application integration directly onto storage nodes.
Fire Eye Malware Protection System: Appliances with Signature-less Malware Protection 7. May 2010 by Thomas Jannot Fire Eye, Inc. today launched a full line of inline network security appliances. According to Fire Eye they are capable of stopping the 90 percent of Modern Malware attacks that traditional intrusion prevention, Web filtering and antivirus products miss.
Survey at Network Security: 89 Percent Consider Network Security Crucial 5. May 2010 by Thomas Jannot An survey announced today by Juniper Networks highlights that the majority (89 percent) of IT Decision Makers surveyed view IT security as crucial to their company’s success. According to Juniper the research findings also suggest that there is a link between this view of security as a business imperative and those companies that met or …
Fire ID Transaction Verification: Out-of-Band Verification Guards Online Transactions 3. May 2010 by Thomas Jannot Fire ID today announced Fire ID Transaction Verification, a new application that ensures only legitimate online transactions and payments are made. Providing a solution to the much publicized man-in-the-browser (MITB) and man-in-the-middle (MITM) attacks which banks are experiencing, Fire ID’s out-of-band Transaction Verification application ought to generate a unique code on the end user’s mobile …
McAfee Firewall Enterprise 8: Solutions Provide Application and Identity Controls 30. April 2010 by Thomas Jannot McAfee Inc. today announced the release of its next generation firewall, McAfee Firewall Enterprise version 8. This new release ought to expand existing application protection delivered by McAfee’s enterprise firewall appliance product line, giving security admins visibility, recognition and policy enforcement over thousands of applications that are invisible to conventional firewall technology.
Zertificon Z1 Secure Mail: E-Mail Security with Integrated ERP Connection 27. April 2010 by Thomas Jannot Zertificon Solutions has now equipped their ‘Z1 Secure Mail Gateway’ e-mail encryption solution with an ERP-Connector integrated into the administrative interface. The solution ought to be able to easily connect via web GUI to Active Directory and Lotus Notes as well as to other LDAP directories. Existing users and groups as well as client structures …
Trusted Computer Solutions Security Blanket 4.0: Automated Tool Locks Down Operating Systems 23. April 2010 by Thomas Jannot Trusted Computer Solutions, Inc. (TSC) announced that the company is offering a free trial of its award-winning Security Blanket 4.0 product. According to TCS it’s the industry’s only automated operating system (OS) lock down, or hardening tool. Security Blanket ought to enable system administrators to configure and enhance the security level of operating systems including …
Tenable Passive Vulnerability Scanner 3.2: Vulnerability Discovery, Forensics and Monitoring 21. April 2010 by Thomas Jannot Tenable Network Security, Inc. today announces the release of version 3.2 of the Passive Vulnerability Scanner (PVS). Tenable’s PVS is a passive technology that monitors network traffic and provides real-time vulnerability data to Tenable’s Security Center management console. In addition, Tenable’s PVS also collects real-time user and forensic activity on the network.