Security

Recent Articles

  • WeRecoverData.com Does Heavy Lifting for e-Discovery

    Recovering crashed hard drives, discovering lost passwords, performing e-discovery chores and other data retrieval tasks have required tools and specialist not often available to the typical solution provider. Customers calling for those services were usually shuffled off to an organization specializing in those tasks, leaving the solution provider out of the loop. WeRecoverData.com is looking…

  • Juniper Channel Program Changes Reflect Industry Growth Areas

    Juniper Networks is following the money. After three-plus years of good marks with its pure-vanilla J-Partner program, Juniper is adding areas of specialization that reflect where its channel partners are migrating. The networking vendor this week added partner specialization programs aimed at the managed services, consulting and service provider sectors, in response to partners who…

  • Check Point Cuts Conventional Security with Software Blades

    Check Point Software Technologies unveiled a new “software blade” architecture that it says will make it easier for its partners and end-user customers to design and implement security solutions tailored for their specific needs. Similar to storage and server blades, Check Point’s software blades divide the different network and perimeter security functions into logical, interoperable…

  • VMware, Intel Remotely Manage Secure Virtual Desktops

    VMware announced Feb. 24 at its VMware Europe event that it will expand the capabilities of its desktop virtualization platform by teaming with Intel’s vPro remote access and management technology, giving solution providers more flexibility to manage virtualized desktop environments remotely, and adding increased security capabilities. VMware’s new desktop CVP (client virtualization platform) hypervisor is already optimized for…

  • Innovating a Secure Passage

    About a decade ago, engineers at FishNet Security—even then one of the larger security integrators—noticed a problem in their customer engagements: monitoring changes to firewall rule sets and optimizing perimeter security effectiveness. The lack of transparency caused firewall inefficiency and forced end users to buy more equipment than necessary. The solution that FishNet engineer Jody…

  • Netgear Tackles SMB Security with ProSecure Appliances

    Netgear’s purchase of security vendor CP Secure is starting to bear fruit, with the introduction of the STM series of ProSecure appliances designed specifically for the SMB marketplace. The STM product line blocks spam, removes e-mail-borne malware and provides protection against Web-based malware. The STM series comes in three models: the low-end STM 150 (designed…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.