Multiple Perspectives on Security

Security Journal

Subscribe to Security Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Security Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

In this white paper we discuss using F5 BIG-IP Global Traffic Manager to orchestrate and deliver access to services in the cloud.   Download now or listen on posterous AudioWP_-_Global_Distributed_Service_in_the_Cloud_with_F5_and_VMware.mp3 (19141 KB) ... (more)

Cloud-Based Software Development Accelerates | @CloudExpo #AI #SaaS

2017 Predictions: Cloud-Based Software Development Accelerates By William Hurley, Senior Director of Software Lifecycle Services, Astadia Adoption and use of cloud-based software engineering platforms will accelerate in 2017. Teams have been working in the cloud for a few years now, but in 2017, the trend will gain far more momentum as senior engineering staff and service providers realize and document the benefits of cloud-based development gains. Adoption will not be limited to open source or Microsoft solutions as all software engineering tool stacks are moving quickly to catch the adoption wave. Leading application lifecycle management companies are already delivering enhanced SaaS platforms for issue and backlog management, source code management, IDEs and testing, allowing for greater control among and between teams and environments. The elimination of "well, it ... (more)

Who You Know Is Everything Today

SAN JOSE, Calif., July 22 /PRNewswire/ -- It is a commonly known fact that Bill Gates was introduced to IBM's Chairman John R. Opel, which led to the inception of Microsoft. "I can't believe that anybody is successful today without professional introductions. It's as important as what you know -- who you know; so having an introduction to decision makers these days is extremely important for getting a job or a sale," says Tim Mather, V.P. & Chief Security Strategist at RSA. In these hard times, when "who you know" is critical, professional networking site Ntroduction enables you to get introduced to a specific job title in a department at a specific company or industry. "A few weeks ago, a Ntroduction member was seeking an introduction to Engineering decision maker at a mid-size company for Cloud implementation. Last week, a mid-size company executive found thi... (more)

Vyatta Brings Open Source Networking to Schools

BELMONT, CA -- (Marketwire) -- 07/29/09 -- Vyatta, the leader in open networking and network virtualization, is bringing the benefits of open source networking to K-12 and higher education. Demonstrating its commitment to the education market, Vyatta has joined EDUCAUSE, a non-profit association that focuses on advancing higher education by promoting the intelligent use of information technology. To celebrate this partnership and commitment to educational excellence, Vyatta is offering a limited-time, 15 percent discount off any appliance or subscription for all qualified educational institutions. Vyatta solutions deliver a full set of open-source networking features that allow customers to connect, protect, virtualize, and optimize networks thereby improving performance, reducing costs, and increasing manageability and flexibility. Vyatta is used by hundreds of cu... (more)

Fi-Tek Selects RSA to Help Meet Multi-Factor Authentication Compliance Requirements

BEDFORD, Mass., Nov. 24 /PRNewswire/ -- RSA, The Security Division of EMC (NYSE: EMC) announced that Fi-Tek, LLC has deployed the RSA(®) Adaptive Authentication platform to enable TrustPortal(TM) online wealth management customers to meet U.S. Office of the Comptroller of the Currency (OCC) compliance mandates that require strong authentication to help prevent identity theft. The OCC charters, regulates, and supervises all national banks and also supervises the federal branches and agencies of foreign banks. TrustPortal(TM) is Fi-Tek's flagship hosted solution for fully-integrated wealth management, providing a suite of products to more than 135 financial services institutions that collectively hold more than $100 billion in combined trust assets. RSA Adaptive Authentication replaces an in-house user name and strong password solution with necessary multi-factor ... (more)

STEALTHbits Introduces Free Tool to Manage SharePoint Versioning

GLEN ROCK, NJ -- (Marketwire) -- 02/23/12 -- STEALTHbits Technologies, the provider of the industry's most comprehensive IT management and compliance platform for Microsoft-based systems, applications, and data repositories, today announced the release of StealthTOOLS™ Library Advisor for SharePoint, a free utility designed to quickly identify content versioning issues within SharePoint Document Libraries. Library Advisor for SharePoint empowers data custodians to take part in proactively reducing cost for their organizations while promoting a greater level of security and operational integrity within the SharePoint environment itself by pinpointing which document libraries are causing capacity and other issues. The task of managing content within SharePoint implementations is daunting for administrators and data custodians, due in large part to the often incorrect... (more)

CYA in a BYOD World: Zenprise to Participate in Panel Session at RSA 2012

REDWOOD CITY, CA -- (Marketwire) -- 03/01/12 -- Zenprise®, Inc., the leader in secure Mobile Device Management (MDM), today announced that Ahmed Datoo, the company's CMO, will be part of a panel session entitled "CYA in a BYOD World" at the RSA Conference in San Francisco. Moderated by Philippe Winthrop, managing director of The Enterprise Mobility Foundation, the panel discussion will delve into how mobile is recasting the IT landscape just like the PC did two decades ago. The invasion of smartphone and tablet personal devices (Bring Your Own Device -- BYOD) into the enterprise has made secure mobile device management a top IT priority. The challenge begins at the device level and then extends into securing data, provisioning applications and managing application access to corporate resources. This panel will discuss challenges, options and tradeoffs around applyi... (more)

Devon IT Offers Its Thin Client Software with Lenovo’s End-to-End Enterprise Solutions

Devon IT today announced its thin client operating system and management software is now available on Lenovo’s expanded end-to-end enterprise solution portfolio. As part of this set of solutions, Lenovo announced the new ThinkCentre M32 thin client is available worldwide. Lenovo M32 Thin Client. (Photo: Devon IT) Lenovo’s ThinkCentre M32 thin client offers customers a choice of a flexible Linux-based thin client operating system, LeTOS or Windows Embedded Standard 7. The thin client also features Lenovo Terminal Manager (LTM) software that is effective, secure and easy to use management software that helps customers centrally manage thin client assets. Lenovo collaborated with Devon IT, a worldwide leader of thin client technology to develop these advanced thin client software solutions. The newly released Lenovo ThinkCentre M32 thin client – unveiled at VMworld201... (more)

Demos to Highlight Endpoint Compliance, Security Automation, Industrial Control Systems Security and Other Applications of Trusted Computing at the Trusted Computing Conference

Trusted Computing Group (TCG) members will demonstrate a number of proven enterprise security applications at the Trusted Computing Conference here in Orlando this week. Asguard Networks will demonstrate integration of Industrial Control Systems (ICS) with enterprise IT and shared public using its SimpleConnect™ product line, which uses the IF-MAP Metadata for ICS Security specification. Fraunhofer SIT’s demonstration uses the Trusted Platform Module (TPM), together with Trusted Network Connect (TNC), showing how security automation allows a more cost efficient management and increases security for large-scale applications, such as point of sale. HSR Institute for Internet Technologies and Applications is showing the first implementation of the new TNC Endpoint Compliance Profile that uses a number of TNC protocols and maintains an inventory of SWID tags. Infineon i... (more)

Research and Markets: Analysis of the SIEM and Log Management Market

Research and Markets (http://www.researchandmarkets.com/research/5sg49x/analysis_of_the) has announced the addition of the "Analysis of the SIEM and Log Management Market" report to their offering. Security information event management (SIEM) and log management products are gaining a strong following as enterprise organizations look for techniques to defend against advanced threats and persistent hackers. As cyber attacks become more sophisticated, organizations are implementing security products, such as SIEM, to protect their virtual and physical assets. Large organizations leverage SIEM to gain the continuous security intelligence needed to protect against threats that inevitably defeat antivirus, intrusion detection systems (IDS), network behavior analysis devices, and firewall defenses. Key Questions Answered - How can I tell earlier if my network is being v... (more)

OneLogin Raises $13M to Power Expansion

OneLogin, the innovator in enterprise identity management, today announced it has secured a $13 million round of Series B venture capital from lead investor The Social+Capital Partnership alongside returning investor Charles River Ventures. OneLogin will use the funds to continue its expansion in the United States, Europe and Asia-Pacific and to accelerate talent acquisition in these markets. OneLogin provides a modern identity and access management (IAM) solution, which enables enterprises to easily manage employee and external user identities and control their access to applications in the cloud and behind the firewall. OneLogin’s comprehensive turnkey solution includes strong authentication, single sign-on, federation, directory integration, user provisioning and reporting. OneLogin has seen rapid adoption among companies, ranging from fast-growing start-ups li... (more)