software
Comodo Internet Security 2011 released
Comodo released its Internet Security Manager 2011 software which offers malware prevention together with central administration features. New in version 2011 are behavior …
Novell Identity Manager 4 released
Novell released their Identity Manager 4 Advanced Edition which ensures consistent identity, security and compliance policies for an organization’s entire IT ecosystem. …
Metasploit Pro released
Rapid7 released Metasploit Pro which improves the efficiency of penetration testers by providing unrestricted remote network access and enabling teams to collaborate …
Tool to test regular expressions for DoS vulnerabilities
Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …
Adobe to release more secure PDF reader
Adobe is announcing the new Acrobat X Family of Products which includes Adobe Reader X as well as Acrobat X Suite, Acrobat X Pro, and Acrobat X Standard. Reader X is the only …
Portable device management and protection for Mac users
Cososys has released Endpoint Protector 2009, a new version of its device management, endpoint security and data loss prevention solution for Mac/Apple computers. The newly …
Agentless configuration auditing
nCircle announced the new version of its Configuration Compliance Manager, an agentless configuration auditing and file integrity monitoring solution that automatically …
Full-service virtual SIEM solution
LogLogic announced the release of a full-service virtual SIEM solution. Leveraging the recently released LogLogic 5 software, LogLogic’s MX Virtual delivers all the …
Data retention system for cyber investigative operations
Bivio Networks announced the launch of its Data Retention System, a data collection and retention system to strengthen cyber security operations for network operators and …
RSA offers complete threat management solution
RSA, the Security Division of EMC, announced a set of core technologies and services designed to help organizations more effectively manage information risk and IT compliance …
Four virtual appliances for cloud security
Fortinet announced four new virtual appliances that extend the company’s ability to deliver security across virtualized and cloud environments. The FortiGate, …
A foolproof drive-by-download blocking tool?
A seemingly foolproof tool for blocking drive-by-download attacks has been developed by a group of researchers at the Georgia Institute of Technology and California-based SRI …