software
Security toolkit for online mobile applications
KOBIL Systems introduced mIDentity App Security Toolkit, which protects mobile users from security attacks. KOBIL offers two reference implementations of this toolkit: …
Novell integrates Mac device management
Novell announced the availability ZENworks 11 Support Pack 2 which includes integrated device management for Mac, and introduces a new product offering with ZENworks Full Disk …
Security platform uses virtual machine introspection
CounterTack announced three new solutions available on Event Horizon, a security platform utilizing virtual machine introspection (VMI), to help organizations identify, …
Apache HTTP Server 2.4 released
Celebrating its 17th anniversary with an all-time record of nearly 400 million Websites powered worldwide, the Apache Software Foundation announced version 2.4 of the Apache …
yaSSL offers new open source security tools
yaSSL has made IT-level security tools available for the open source community, ensuring that mature, advanced security tools like Kerberos, wpa_supplicant, and OpenSSH are …
Automated security analytics and protection
Network security teams face the task of protecting networks with disparate tools that are limited, slow and labor intensive. Multi-stage attacks executed by diligent cyber …
Webroot delivers endpoint protection
The security landscape has changed and traditional signature-based software can’t keep up. A recent study of IT decision makers found an overwhelming 95 per cent …
New solution and certification addresses the BYOD challenge
Aruba Networks introduced ClearPass, an access management system for the secure provisioning of mobile devices on any enterprise network. It’s designed to enable IT …
Trend Micro makes HijackThis open source
Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …
Acunetix Web Vulnerability Scanner 8 released
Acunetix Web Vulnerability Scanner 8 (WVS) echoes years of counter-hacking experience through its new ability to lock hackers out by integrating scan results into …
Forensic toolkit with malware analysis technology
AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …
Open source tool detects videoconferencing equipment vulnerabilities
Videoconferencing equipment has been in the news recently for its potential for use by attackers to snoop on confidential company meetings, view charts mounted on meeting room …