Please turn on your JavaScript for this page to function normally.
New security gateway virtual appliances

Secure Computing announced it is working with VMware to provide customers with security gateway virtual appliances for organizations of all sizes. These appliances for VMware …

Data encryption solution that maintains hard disk bootability

CMS Products announced the inclusion of an innovative new security feature within its BounceBack Professional Disaster Recovery Software. BounceBack Professional soon will …

Centennial Software acquired by FrontRange Solutions

FrontRange Solutions has acquired Centennial Software. Centennial a developer of dynamic infrastructure management products, including auto-discovery, inventory management and …

Hitachi ID releases ID-Archive 5.0

Hitachi ID Systems released ID-Archive 5.0 that builds on technology from the next generation Hitachi ID Management Suite to offer more secure and robust infrastructure for …

Password management solution with hardware-based encryption

Lieberman Software Corporation’s new Random Password Manager 4.0 is the first privileged password management product to incorporate hardware encryption, multi-factor …

Alleged webcam hacker accused of spying on girls

IT security and control firm Sophos is warning home computer users about the importance of properly securing PCs, following news that a man who allegedly used computer malware …

Virtualization technology enables secure wireless access

Array Networks introduced WiFiProtect, an identity-based access control solution for WLAN networks. WiFiProtect’s virtualization technology automatically funnels all …

Exaprotect unveils LogManager 3.0

Most organizations struggle to capture and manage their IT infrastructure and systems logs, a critical necessity for compliance with regulatory and audit requirements. The …

BIO-key granted image identification system patent

IO-key International announced that on April 15, 2008, the U.S. Patent and Trademark Office issued US patent No. 7,359,553 covering BIO-key’s image enhancement and data …

Free tool for P2P-related file discovery

With funding from the National Institute of Justice, ATC-NY has developed P2P Marshal, a software application that automatically gathers, in a forensically sound way, all of …

Majority of users leave their wireless networks exposed

Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new …

Info on Gartner’s IT Security Summit 2008

New generations of technology-savvy users and a growing wave of gadget-prone communication devices are making their way into the workplace, bringing with them new security …

Don't miss

Cybersecurity news