Patching is supposed to secure your organization from the latest batch of malicious code. But try telling that to the state of Alaska’s IT department. Staffers were working diligently to stay ...
Our Technology Update this week takes a look at one of the last lines of defense in the war against viruses, worms and other attacks brought to us by the ne’er-do-wells of the networked world: ...
The Defense Information Systems Agency is juggling efforts to expand a critical cyber defense system and bolster it with more advanced features that will help the Defense Department better protect its ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
If a firewall is like having a security guard at your office door, checking the credentials of everyone coming and going, then an intrusion-detection system (IDS) is like having a network of sensors ...
The Westminster, Colo.-based distributor, through its Network Security Solutions group, will offer McAfee IntruShield and Entercept to solution providers, executives said. "Data is the most important ...
As network threats continue to grow in number and sophistication, a new technology offers an additional layer of protection. Host-based intrusion-prevention system (HIPS) technology protects endpoints ...
COLORADO SPRINGS, Colo. — LANDesk Software Inc., the desktop management specialist acquired last year by Avocent Corp., has added Host-based Intrusion Prevention System tools to its security suite.
In a similar fashion to its quiet acquisition of the VDI desktop broker Propero, VMware has quietly acquired a company called Determina and its host intrusion prevention software - although terms of ...
IDS (intrusion detection system) products have been undergoing a renaissance of late. By incorporating application-layer packet-filtering capabilities, they are evolving to provide more than just ...
This requirement applies to RIT-owned and leased computers. There is currently no requirement for personally-owned machines to run host intrusion prevention. Currently, personal networking devices ...