Network security is a daily and complicated struggle for most network administrators who strive to keep on top of the latest virus outbreaks, network intrusion attempts, software patches, and web and email scams. Comprehensive Network security today requires a layered approach so that internal network resources can be properly protected against all the different types of malicious content out there. Properly designing and maintaining a network to guard against these attacks can be a challenge to even the most seasoned admin
Beginning the compliance process
There are some first steps which will help you deal with any compliance initiative, things to do before starting the actual work of aligning your practices and policies with the requirements you must meet. They seem simple, but are often overlooked. First, read the regulation
Astaro to offer Free Business Firewall for VMware
Today, Astaro announced that it will soon offer a Free Business Firewall for VMware to all organizations with virtual environments. The Free VMware Firewall will protect networks from external threats as well as control and monitor communications between virtual machines. The Free Business Firewall for VMware offers the base functionality of the Astaro Security Gateway virtual appliance using a special license key
Why attack Twitter?
The recent high profile attacks on social networking sites such as Twitter and Facebook may give us a glimpse into the underground world of spammers, crackers, and those who style themselves as 'bot-herders'. As you're probably aware Twitter is a social networking site that allows users to generate short messages or 'tweets' which are then disseminated throughout the internet to a larger audience. The service started only a few years ago and since then its usage has exploded partly due to its high profile involvement in such recent events as the Iranian presidential election protests
A Conversation on "Health Information Technology"
On Sunday, the Boston Globe printed a portion of a letter to the editor I sent in regards to one of the paper's articles. The opinion discussed the mandating of electronic health records and the importance of security for such records. Below is the complete letter.
Choose the battlefield
PC World's Jaikumar Vijayan recently reported on the attacks against US government public information infrastructure. In the article, Karen Evans, a Bush administration Information Systems executive outlined what she thought should be fast-tracked. It includes using TICs (Trusted Internet Connections) for all public infrastructures.
Virtualization as a Disaster Recovery Strategy
There have actually been a few major disasters in the past 10 years that have shown the value of good disaster recovery plans. Though they're far from perfect they do make a difference and can always be improved with newer techniques and technology.
Ideas are for sharing
We are rolling out a new service for our partners and customers – an improved feature request site. On this new site our partners and customers can make suggestions for improvements or request totally new functionality. Not only can visitors make their own suggestions – they can vote on the suggestions of others, giving us a better understanding of the popularity or urgency of specific network security needs
Microsoft’s DirectAccess: Reinventing VPN
As we know, Virtual Private Networking (VPN) is a technology that allows remote systems to connect to a local system in a secure manner.
Up2date 7.402 Launched
Hello! Astaro has released Up2Date 7.402, which is a stability release.