Startup Pertino -- backed by former executives from Packeteer and Apple -- has what one analyst calls the most advanced networking as a service (NaaS) product on the market, available starting today as a public beta. To spin up a ...
Tags: Startup Pertino, Packeteer, Apple, networking service
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended ...
Tags: Barracuda Networks, security issue, network security appliances
According to a survey from security training firm PhishMe, employees working from home could be an easy back door allowing targeted attacks to get behind an organisation’s email defences. In a poll of 1,000 UK office workers, 49 ...
Today’s mobile spam and phishing attacks will increasingly delivered by mobile malware networks, despite mobile device operating systems being more secure than those of desktop or laptop computers, a report has found. Blue Coat ...
Tags: mobile spam, mobile, malware networks
Analysts are unsure whether RIM's new enterprise mobility software, now available for download, can halt the migration away from BlackBerry smartphones. The new BES 10 tool set combines security, device and application management for ...
Showing what can happen when companies don't periodically review network logs, a software developer working for a large U.S. critical infrastructure company hired a Chinese firm to do his job so he could spend time surfing Reddit and ...
Tags: network logs, software, critical infrastructure, IT
To simplify the roll-out of clusters for big data applications, Skytap is now offering pre-configured Cloudera Hadoop templates that can run in the company's public cloud. There is a growing interest in big data using Hadoop, but to even ...
The pros and cons of BYOD were laid out in a panel discussion at Infosecurity 2013 yesterday, with the CISOs of Commerzbank, law firm Field Fisher Waterhouse (FFW) and National Rail all giving their views on one of the most talked about ...
Tags: BYOD, panel discussion, Infosecurity, IT industry
Köln/Bonn are just GBP 15.99(less than 25€)away from the UK.To visit the leaning tower of Pisa or the Rialto bridge in Venice will also cost the same.As the first low-cost airport in the UK,Coventry Airport is offering flights to ...
Brocade has announced its acquisition of Vyatta, a privately held maker of open source-based network software, for an undisclosed amount of cash. Vyatta develops an open source network operating system that is relevant for multiple ...
Tags: Brocade, Vyatta, acquisition, network software
Palo Alto Networks Tuesday unveiled the first virtualized version of its next-generation firewall, server-based software intended to run on the VMware platform to allow security managers to set up firewall application-layer controls in ...
Tags: Palo Alto Networks, firewall, VM, USA, next-generation
IDG News Service - Bucking the corporate practice of buying instead of building internally, Google's corporate IT department will typically build management software itself, or adopt an open source software package, before investigating the ...
Tags: Google, IT, management software, software
Multinational companies are spending large sums on corporate virtual private networks(VPNs)to make their business-critical applications secure and available,but still using them for more mundane tasks,such as browsing the web or checking ...
4t Networks recommends that business owners in South Carolina prepare for hurricane season by implementing a disaster recovery plan. For organizations unprepared with a backup and disaster recovery plan, a hurricane can destroy your ...
Tags: 4t Networks, disaster recovery, data, computing
More than one in four Wi-Fi networks in London are poorly secured or not secured at all, a scanning experiment by security firm Sophos has revealed. The experiment was conducted over two days by the firm’s director of technology ...
Tags: WiFi networks, Sophos, technology strategy, wireless network