Vendors/Products
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Intel Corp. on Friday announced here that late next month it will make available an open-source Linux version of its Common Data Security Architecture (CDSA), a software infrastructure for security services.
Lucent Technologies' Lucent Security Management Server (LSMS) offers a robust management server for the company's VPN Firewall Brick security device. Now LSMS version 5.0 brings client download features and automated client update notices. VPN (virtual private network) clients, however, still need . . .
Computer security provider Symantec Corp. said on Thursday it would acquire Axent Technologies Inc. in a stock swap worth $975 million, accelerating its move into the market for large business system security. . . .
WetStoneTech, creators of several security products for Linux, submitted the following. "Gary will direct all Cyber Forensic and Economic Crime efforts at WetStone. "Our current efforts in assisting law enforcement personnel, the U.S. goverment, and the private sector in the areas . . .
How are the various Linux distributions doing in terms of general security? In this article, a few observations on the results of a quasi-statistical analysis of the security fixes issued by Linux distributions are made. Also, looked at in this article . . .
This article contains a series of slides which were presented at LinuxTag 2000. It compares the performance of FreeBSD, NetBSD, OpenBSD, Linux and Solaris. Also, it offers ideas on performance tuning for these operating systems.
SecuritySpace.com, http://www.securityspace.com/sspace/index.html, a leading security portal, today launched the Desktop Security Audit, a new tool that will radically reduce the cost of finding and fixing website and PC-based security holes. Built on an ASP model, the Desktop Security Audit is an . . .
Surging demand for secure Internet connections helped online security company Check Point Software Technologies Ltd. (CHKP.O) more than double its earnings in the latest quarter, beating forecasts, the company said on Wednesday. . . .
Identix Inc. - a Motorola Inc.-funded maker of fingerprint identification devices - last week launched a division that will offer biometric authentication services to wireless and Internet service providers. The technology will allow customers of wireless services and products to . . .
The Cyber Group Network Corp. (CGN) is developing a software-controlled hardware device that can be installed in computers worldwide to either locate or destroy the devices when they are lost or stolen. . . .
Businesses are also becoming more conscious of the legal liability they have for inappropriate and illegal content such as abusive email, spam and pornographic material. . . .
E-business company Solsoft Thursday rolled out security software for Linux. Dubbed Solsoft NP-Lite, the software will be included with the Linux-Mandrake Power Pack or Deluxe 7.1 operating system, although it works with other Linux distributions. The security of Linux has . . .
Here's an older announcement from Secure Computing, but serves as a precursor to a shortly forthcoming interview with their senior corporate members. "Secure Computing Corporation announced that it has been awarded a sole source contract by the National Security Agency (NSA) . . .
Secure Computing Corporation, from the RSA Conference 2000, today announced first customer availability of SafeWord, the leading scalable authentication solution in the industry, on the Linux operating system (OS). Traditionally, SafeWord running on the UNIX platform has a history of being . . .
Intrusion.com, Inc., a global provider of enterprise security solutions, today announced the acquisition of MimeStar, Inc., developer of the advanced network intrusion detection software, SecureNet Pro[tm]. Under the terms of the merger agreement, Intrusion.com expects to pay $4 million in cash and issue 95,969 shares of its stock to MimeStar's stockholders.. . .
3Com Corporation announced a simple yet powerful solution for securing data transmitted over a wireless local area network (LAN). The company's wireless secure tunneling solution adds seamless Layer 3 tunneling, authentication and encryption to the 3Com AirConnect 11Mbps Wireless LAN to . . .
The promise of combining fingerprint recognition with smartcards is now a step closer to being fulfilled. Norman Data Defense Systems -- one of the companies working on smartcard data security systems with Siemens and others -- announced it has succeeded . . .
The basic idea behind Medusa is really simple. Before execution of certain operations, the kernel asks the authorization server (Constable) for confirmation. The authorization server then permits, forbids or changes the operation. The authorization server and kernel talk to each other . . .
Trustix AS, the leader in eBusiness Systems Management Solution for Linux, announces the release of Trustix Secure Linux 1.1, the preferred Linux distribution for eCommerce applications. Trustix Secure Linux 1.1 is primarily a maintenance release, however the new release does have . . .
... Under the terms of the agreement, TheLinuxStore.com obtains the rights to market, promote and resell LinuxSolve's line of Linux-based server applications, running firewalls/gateways, email, file, print and web server applications all managed via its browser-based tools through mid-2001.