Please turn on your JavaScript for this page to function normally.
Check Point Software Unveils New SmartLSM

First Solution to Enable Simple VPN/Security Deployment and Management for Up to One Thousand Franchise Locations REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …

Research Firm Recognizes Check Point as VPN Market Leader

Leader Position Based on Ability to Execute and Completeness of Vision REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point Software Technologies Ltd. (Nasdaq: CHKP), the …

Check Point Software And Internet Security Systems Secure Networld+Interop and COMDEX Event Network

Check Point and ISS Provide Integrated Security Framework with Best-of-Breed Technology for Largest Short-Term Network REDWOOD CITY, Calif., Sept. 10, 2002 – Check Point …

Baltimore Technologies Plc Announces Restructuring Close to Completion and Half-Year Results in Line with Expectations for 6 Months Ended June 30 2002

London, UK – September 10, 2002 – Baltimore Technologies (London:BLM), (“Baltimore”) today announced its interim results for the six months ended 30 …

The Weakest Link in Disaster Recovery

Much of the focus of disaster recovery planning is on creating redundant data sites and backup tapes. Very often, a crucial component is overlooked: that of keeping current …

Ositis Ships SiteStripper

SiteStripper Increases Productivity, Manages Resources and Enforces Policies to Prevent Employees from Accessing Prohibited Websites Pleasanton, CA — September 6, 2002 …

Trend Micro to Join Nikkei Stock Average

Tokyo, Japan – September 9, 2002 – Trend Micro Inc. (TSE: 4704, Nasdaq:TMIC), a leading provider of antivirus and Internet content security software and services …

SSH Communications Security Achieves Opsec Certification From Check Point Software

SSH Certifier Integrates with Industry’s Most Recognized Security Framework HELSINKI, FINLAND and PALO ALTO, Calif. – Date 10, 2002 – SSH Communications …

How To Ensure Security When The Business Itself Is Confidential, Personal Information

TruSecure and American Tenant Screen Present a Free Webinar on Security for Information Businesses Smaller businesses face the same information security challenges as Global …

Multitool Linux: Practical Uses for Open Source Software

This book is intended as a guide for users who already installed their Linux boxes, but are unsure of their possibilities or don't know what to do with them. As such, it does …

Top Layer Networks Secures $28 Million

Funding Enables Aggressive Market Expansion and Spurs Innovative Product Development Westboro, MA – August 20, 2002 – Top Layer Networks, Inc., the leading …

Buffer Overflows – Defending against arbitrary code execution

Buffer Overflows are one of the most common and potentially deadly forms of attack against computer systems to date. They allow an attacker to locally or remotely inject …

Don't miss

Cybersecurity news