Search This Blog

Tuesday, February 26, 2013

Juniper security products use device-fingerprinting as way to detect, block attacks

  Hottest products at RSA Conference 2013 | RSA: Big data, analytics services will secure data centers
 
  Network World Security

Forward this to a Friend >>>


Juniper security products use device-fingerprinting as way to detect, block attacks
Juniper Networks today rolled out a battalion of security products and services to protect corporate networks, stating that when it comes to defensive measures, security attacks can be better prevented by determining device-fingerprinting rather than blocking attacks based on IP address. Read More


WEBCAST: HP Intel VMware

Beyond Virtualization: Stepping up to the Cloud
In this Webcast you will learn how VMWare, Intel and Hewlett-Packard have teamed to create the "software-defined data center," the foundation for highly functional cloud solutions based on VMware vCloud Suite and HP CloudCenter technologies. View Now!

WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Hottest products at RSA Conference 2013
Our roundup of new security products on hand at this week's show. Read More

RSA: Big data, analytics services will secure data centers
RSA, the security division of EMC, kicks off its annual security conference on IT security today with a pitch to establish its new Big Data Security and risk-governance products as a foundation for security operations centers. And RSA says it'll send in its security professionals to help set them up, too. Read More

14 dirty IT tricks, security pros edition
The IT security world is full of charlatans and wannabes. And all of us have been "advised" by at least one of them. Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

Microsoft admits to being hacked too
Once upon a time, Microsoft claimed that falling prey to social engineering tactics and then being hacked was a "rookie mistake." But now is the time for companies to jump on the bandwagon, to admit they were targeted by cyberattacks and successfully infiltrated. The stage is so crowded with 'giants' at this point, that there are fewer 'bad press' repercussions than if only one major company had admitted... Read More

CISPA: Experts agree, private info not needed for sharing cyber threats with gov't
If you were given a cloak of absolute immunity and then tasked to share cybersecurity threat information, would you take the extra time to strip out all personally identifiable information (PII) before passing it on to the government? Although no judge will look over your shoulder, no warrant will be required, and no one will smack your hand for sharing sensitive user data that is not required, would... Read More

Firefox to auto-block third-party ad cookies by summer
Mozilla will automatically block third-party cookies starting with Firefox 22, which is slated to ship this summer, according to the Stanford University researcher who coded the change. Read More


WHITE PAPER: Fiberlink Communications

Best Practices Guide: for Mobile Device Management
This guide gives you best practices for Mobile Device Management (MDM) in the Enterprise that you can use now. Learn More

HP unveils 'Big Data Security' strategy
HP today took the wraps off its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can yield new ways to detect cyberattacks or rogue-employee behavior. Read More

Trend Micro adds Facebook scanner to mobile security suite
Trend Micro is adding the often confusing world of Facebook privacy settings to a new version of its flagship security software. Read More

Phishing concerns cause double trouble
Episode 1: Last week the administrators of 7,000 university websites were being called upon to change their .edu domain account passwords after a server security breach. Trouble was that the breach had been reported to the admins by Educause -- the non-profit higher-education IT group that runs .edu -- via an email that some recipients complained bore the familiar markings of a phishing attempt. Read More

3 questions: Etsy, ecommerce and application security
'Add to cart'. 'Click to buy'. --What could be simpler? Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. If Apple had unveiled Google Glasses ...

2. Google fixes 22 flaws in Chrome, slams silent add-ons

3. Cisco virtual router targets the cloud

4. iPhone 6 rumor rollup for the week ending Feb. 22

5. How successful are the companies behind the biggest Linux distros?

6. Why Android 4.2.2 is an important update

7. Microsoft Azure overtakes Amazon's cloud in performance test

8. Cisco brings server virtualization to the branch office

9. How Arista Networks got out in front of the SDN craze

10. Cisco, Avaya feel the heat from Microsoft Lync

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: