Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

High-Risk Workloads To Get SWR

E-mail Print PDF
High-Risk Workloads To Get SWR

Gartner suggests the adoption of Systematic Workload Reprovisioning (SWR) to counter advanced threats compromising the host OS at deep level, particularly when it comes to dealing with high-risk workloads. 

SWR is relatively straightforward-- it involves the periodic rebuilding and reprovisioning of server and desktop workloads from a high-assurance base image file library. Through workload restoration to a high-assurance state, security professionals can proactively remove deeply rooted malware, making sure undetected intrusions don't continue Read more...

Security Market Secures Rebound

E-mail Print PDF
Security Market Secures Rebound

Gartner reports the WW security software market grows by 12% Y-o-Y in 2010, reaching revenues of $16.5Bn (from 2009 revenues of $14.7Bn). 

This was something of an awaited rebound for a security market hit by a sharp fall in 2009 due to a slow economy and tight IT budgets. 

Security products are going through a a period of rapid evolution-- in both their delivery models (security as a service is growing in popularity) and technologies. The current picture portrays key vendors expanding their product portfolios, buying companies (often startups developing Read more...

A Security Vulnerability Reporting Standard

E-mail Print PDF
A Security Vulnerability Reporting Standard

The Industry Consortium for Advancement of Security on the Internet (ICASI) launches version 1.0 of its security report framework, allowing vendors to share software vulnerability data more easily. 

The Common Vulnerability Reporting Framework (CVRF) is a free-to-use machine-readable XML-based reporting standard which ICASI says sorts out the different formats companies use to report and refer to discovered vulnerabilities across multiple product types.

The idea is that vendors adapt the CVRF, thus eliminating the need to translate between incompatible Read more...

GTB Soars to the Cloud

E-mail Print PDF
GTB Soars to the Cloud

GTB Technologies announces its Inspector "reverse content-aware firewall" is now also available for cloud-based servicess and changing virtual data center architectures. 

The firewall scans and analyses all outbound data transmissions through the network in realtime. Once it detects a treshold amount of protected data (such as bank accounts, credit card numbers and passwords), it stops the violating transmission and alerts the security officer or administrator. 

The Inspector carries mass communication features and is compatible with multiple devices Read more...

Astaro Goes to Sophos

E-mail Print PDF
Astaro Goes to Sophos

Sophos acquires network security solutions provider Astaro for an undisclosed sum, saying the purchase will help it deliver its "vision of providing complete security without complexity". 

Astaro is the world's 4th largest dedicated unified threat management (UTM) provider, with over 56000 installations in around 60 countries and a significant EMEA presence. 

The companies say their combination should offer partners a differentiated range of security solutions and services deployable anywhere in any way-- software, virtual, appliance-- via cloud Read more...

Page 62 of 67