Tag: downloads

Social media = email (At least when it comes to network security)

Social media sites such as Facebook, Linkedin and others have become parts of our everyday lives. People announce their engagements on Facebook and network without ever leaving the house. They play games and even discuss political arguments right on the 'wall' of their personal profile pages.

Astaro introduces three new products

This morning, Astaro announced three new products that will be available in 2010. Each product will allow organizations to connect their network while remaining confident in its security and ensuring access to information. Also in development is version 8 of the Astaro Security Gateway

Security and employee productivity

Many organizations view Internet security as a necessary expense and nothing more. They realize it is crucial to secure their network and select security products that will block malware and filter spam. While recognizing the need for security is a positive step, many of these organizations are missing out on an opportunity to improve their business operations by using these same tools.

You wouldn’t buy a car without test driving it first – would you?

As we get closer and closer to the end of 2009 businesses are beginning to reevaluate their security products. When evaluating products most companies have a clear picture of the features they want. So they look for products that offer those features.

Why do government agencies need network security?

Government and municipalities are especially vulnerable to Internet attacks and face a complex set of challenges–protecting the security of data transactions, complying with regulatory mandates such as FISMA and guarding against malware and viruses, all while providing the benefits of web and network communication to employees. Attacks on smart-grids, government agencies and local municipalities demonstrate the vulnerability of government networks. In addition to protecting themselves from cybercriminals, government organizations also require technologies that allow IT administrators to create VPN connections and set up content filtering rules.

P2P Law

A new bill in Congress could put an end to the use of popular P2P (peer-to-peer) programs on all federal computers according to Federal Computer Week (Bain, 2009). This ban would be the result of a number of high profile incidents where sensitive government documents were leaked from government pc's using P2P software. The leaks were discovered during a Congressional investigation (Moscaritolo, 2009) and have prompted lawmakers to consider prohibiting these programs from not only all government owned computer systems, but also from all computers used by government contractors and telecommuters