Recent Articles
-
F5 Launches Firewall for Data Centers
F5 Networks has launched a data center firewall designed to protect public-facing websites from cyber-attacks while also competing with other vendors in the space on both traffic capacity and cost. According to Dean Darwin, vice president of worldwide channel sales at F5 Networks, customers are beginning to recognize that the application delivery network is a…
-
Alcatel-Lucent, Arbor Networks Partner on Cloud-Based Security Platform
Under a new Alcatel-Lucent and Arbor Networks partnership, service providers would be able to offer customers cloud-based defenses against distributed denial of service (DDoS) attacks. Arbor Networks’ Threat Management System (TMS) software has been integrated into blades installed inside Alcatel-Lucent’s 7750 router, the companies said Jan. 18. Each blade can handle 5G bps of traffic…
-
Smartphones, Tablets, Android Are Why Malware Is Going Mobile in 2012
For years, computer users’ biggest security threats were attacks against their desktop computers and applications. But cyber-criminals increasingly have been turning their sights toward mobile devices and Web applications, as they are fertile new ground for lucrative cyber-attacks. It won’t happen overnight, of course, and there will still be more than enough security flaws impacting…
-
Symantec Acquires LiveOffice for Cloud-Based Archiving
Data protection and cloud services provider Symantec, filling out its cloud and collaboration software portfolio, revealed Jan. 16 that it has acquired longtime partner LiveOffice, a provider of cloud-based archiving services. Financial details of the transaction were not released, but Jefferies & Company equity analyst Aaron Schwartz said in a media advisory that he estimated…
-
Firewalls and Firewall Management: Here to Stay
Contrary to some security experts’ proclamations over the past few years, the demise of the corporate firewall has been seriously oversold. While depending on the firewall and antivirus (AV) alone would be considered foolish in today’s time of sophisticated cyberattacks designed to elude these signature- and rule-based blacklist technologies, the truth is that the firewall…