Search

Results 701-720 of 828 for Jack M. Germain.

Barracuda Reporting Engine Trails Web-Surfing Workers

Barracuda Networks has added advanced reporting capabilities to its Barracuda Web Filter appliance, the company announced Wednesday. The new in-depth reports provide network administrators deeper visibility into corporate Web usage, enabling better management and assignment of bandwidth. "The applia...

EXCLUSIVE INTERVIEW

Imperva CEO Shlomo Kramer: Security Is All About Visibility

Imperva specializes in data security and compliance solutions for the data center. Its product line provides an automated and transparent approach to protecting and controlling sensitive data throughout transactional data systems. The Imperva database and Web application appliances are deployed in l...

CIO Survey Shows Mobility Going Mainstream

Competition is pushing all types of businesses toward greater mobility as companies ready plans to adopt mobile applications for core business activities. Business mobility has gone mainstream, according to a global survey conducted by Nokia and the Economist Intelligence Unit in cooperation with th...

Latest Intel Chips Land in Lenovo Laptops

Lenovo unveiled on Wednesday three new notebooks built around a new processor and chip set announced the same day by Intel. Lenovo engineered both the ThinkPad T61 and the ThinkPad R61 with its new Top Cover Roll Cage for enhanced durability, an improved thermal management cooling and efficiency sys...

Microsoft Invites Collaboration With Grid Computing Research

Microsoft released last week details about its SecPAL project to encourage collaboration from the grid computing community on methods for greater security and access controls. Microsoft developed SecPAL, or Security Policy Assertion Language, as a research project to develop a language for expressin...

Mobile Enterprise Tools, Part 2: The Roadside Desktop

Industry analysts report that the mobile enterprise application market reached $1.2 billion in 2005 and is forecast to grow to $3.5 billion in 2010. Other industry studies predict that at least 40 percent the workforce will be mobile in 2007. "Integrating mobility into an enterprise is a proven way ...

Are Data Leaks Bleeding Your Company Dry?

The data drip is here. Computer security experts are worried that corporate data leaking from networks onto small mobile storage devices will worsen into a flood of stolen customer and company information. Over half of all information leaks travel to personal data storage devices such as USB drives,...

EXCLUSIVE INTERVIEW

McAfee CSO Martin Carmichael: When Security and Business Lock Horns

Martin Carmichael, the chief security officer for security software developer McAfee, is responsible for IT security, forensics, risk management, physical security, IT security engineering, and compliance with regulatory controls. He also serves as the chief privacy officer for McAfee. His more than...

Is Your Corporate Intranet Out of Date?

Corporate intranets are becoming big business, both for the designers who put them together and companies that use them to empower their employees to participate in two-way discussions about corporate dealings. However, not all companies are eager to implement the new technologies that are redesigni...

Mobile Enterprise Tools, Part 1: The Road Warrior’s Gun Belt

CEOs and CIOs are quick to tell their corporate superiors that today's mobile workforce is changing. Workers are younger and nearly always on the move. This new trend toward mobility disperses a company's workers geographically. These mobile workers are armed with the latest arsenal of communication...

Free Antivirus Download Roots Out Rootkits

Grisoft Software, the developer of AVG Internet security products, introduced Tuesday a free product aimed at detecting and removing rootkits. Rootkits, a specific malware type which hides in other applications or in a computer's operating system kernel, allow malicious applications to collect passw...

SANS to Offer Certification for Security Software Programmers

A coalition of major technology users and vendors organized by the SANS Institute announced Monday what it called a first-of-its-kind testing and certification program for software programmers. The new examinations are designed to enable reliable measurements of technical proficiency and expertise i...

PRODUCT REVIEW

Norton 360: Is Hands-Off Security a Good Thing?

Symantec's latest security suite, Norton 360, gives less-experienced consumers a fresh approach to hardening their computer security with a from-the-ground-up rebuild of its Norton Internet Security Suite into a product that offers anti-intrusion, PC optimization and backup modules. Norton 360 takes...

PRODUCT REVIEW

PC Guardian: Putting the Clampdown on Laptops

PC Guardian, a manufacturer of computer and data security products, has introduced a product line that puts a new twist on some old security issues involving physical computer theft and data loss through exposed USB devices. Cable locks for laptops are nothing new. On nearly all laptops and numerous...

EXCLUSIVE INTERVIEW

Sun Microsystems’ Vipul Gupta: Security Never Rests

Sun Microsystems is an industry leader in network security. It offers its own open source operating system, Solaris, and a Java desktop system. Sun's influence with network encryption and security solutions permeates the computer industry. TechNewsWorld discussed security issues with Dr. Vipul Gupta...

Vista, Hackers, Red Flags and Bulls

Microsoft last week unleashed its six versions of its new operating system, Vista. The software maker's promises of a more robust kernel and built-in security enhancements have created the impression among consumers that third-party security solutions for antivirus, spyware and adware will become a ...

Vista: A False Sense of Security?

With the first shipments of the new Microsoft Vista operating system still lingering on store shelves, many consumers may not yet be sure whether Vista's much ballyhooed security enhancements will make them less vulnerable to virus, adware and spyware infections. Microsoft claims its restricted acce...

EXCLUSIVE INTERVIEW

Secure Computing CEO McNulty: What Drives the Malware Industry?

Secure Computing has been delivering solutions for Internet security for 20 years. With more than 11,000 global customers, the company offers support by a worldwide network of partners. The company is headquartered in San Jose, Calif., and has sales offices worldwide. Secure Computing has gone throu...

Check Point Expands Security Reach With Three Acquisitions

Internet security firm Check Point Software Technologies announced that it has completed the acquisition of NFR Security and is nearing completion of it purchase of Protect Data and Pointsec Mobile Technologies. Company officials said the acquisitions will help Check Point expand its reach into the ...

FUTURE WATCH

2007: Biometrics Grows, Storage Shrinks, ‘Free’ Disappears

Making New Year predictions about technology requires a very polished crystal ball. Eric Openshaw, principal and leader of Deloitte Consulting's technology, media, and telecommunications practice in the U.S., offers some sobering insights into the world of consumer technology, providing details abou...

Technewsworld Channels