Profile of Martin Garvey
News & Commentary Posts: 359
Articles by Martin Garvey
APSolute Insite is meant to deliver comprehensive network management and security auditing, making it easier control user access to data.
Compuware will unveil upgraded software for its Vantage application service-management appliance using technology from its acquisition of Adlex in May.
Uplogix introduces a new version of its network management software for centralized and remote management that makes use of out-of-band techniques to gain access to servers and other IT systems that have crashed, lost power, or have faulty network connections.
The additions to BMC's service-oriented resource management system are designed to help better allocate resources to virtualized servers and data-center and systems-management processes.
The systems-management appliance lets IT departments automate processes without writing code or scripts.
The Magellan DataPath Manager adds support for Linux, provides root-cause analysis, and lets customers manage LANs and WANs.
Ecora's Enterprise Auditor has built-in HIPAA reports that map directly to the act's security rules, making it easier to quickly generate compliance reports.
AOL is offering customers free software from Computer Associates that scans a PC to detect and block more than 28,000 types of spyware, adware, keystroke loggers, and Trojan horses.
ConSentry Networks introduces two low-cost, high-speed security appliances designed to clamp down on worms and viruses.
Citadel Security Software has purchased an insurance policy from AIG to back its Hercules software-vulnerability remediation service.
A system from Blue Lane Technologies helps to protect Western Corporate Federal Credit Union while providing time to test software patches.
Two risk-management and auditing service providers next week will unveil a framework to help customers deal with vulnerabilities in old application source code.
Schlumberger Oilfield Services deploys a security appliance from Lockdown Networks to prevent unauthorized access to its network and to ensure that those that do connect have updated security software installed.
Shavlik Technologies combines patch management, reporting, and automated anti-spyware technology to reduce the amount of time and money it takes to find and remove spyware.
The utility is using satellite communications, weather tracking, homegrown applications, and mapping technology to organize and dispatch response teams to restore power to hundreds of thousands of customers.
Braxton County Public Schools in West Virginia are deploying security gateways introduced this week by Symantec to fight off security threats.
Stanford University's School of Education deploys new security modules from Juniper Networks to tighten security and boost network performance.
Microsoft issues six patches, three critical ones that deal with vulnerabilities in Internet Explorer.
Dow Lohnes & Albertson uses an IM logging service from Omnipod to keep instant messages free from viruses, quarantine suspicious files, and alert administrators when someone tries to transmit an infected file.
A new version of Sygate Enterprise Protection software will help Diebold secure internal systems as well as bank ATM networks and systems.
Pace Suburban Bus deploys software from Solidcore Systems to prevent unauthorized code from executing on crucial servers and let IT managers install security patches on their own schedule.
New Clariion technology helps administrators shift data across storage networks for data backup and volume-management tasks.
Two years after the blackout, electric companies are still developing security plans
Medical staffing firm uses Sanctuary Device Control to monitor every USB port on the network and set policies on the use of USB memory sticks.
Security vendor TippingPoint says it will pay researchers and hackers for information on software security vulnerabilities, while rival iDefense says it will double the bounty it pays for vulnerability information.
There were 422 new vulnerabilities discovered in the second quarter, up 20% from the same time last year, according to SANS Institute.
The E-mails appear to come from eBay and ask for information to help protect the customer from Internet attacks.
Revenue in the quarter was $76.5 million, up 1.2%, while net income was $8.5 million, up 6%.
Microsoft pays $250,000, though even bounties like this may not be enough against today's more-sophisticated virus writers.
RWE NPower is using Clearswift's new anti-spam security appliance to monitor and filter E-mail and other content.
Experts say CardSystems data-theft incident shows how vulnerable some financial-services companies are.
New suites combine security, storage management, and desktop-migration tools.
With customers of large institutions wary, E-mail crooks turn to smaller banks
Research by Cyota, an anti-phishing vendor, and Gartner shows that the phishing business is still booming.
The fixes are designed to plug holes that range from buffer overflows to unauthorized wireless Bluetooth access to denial-of-service vulnerabilities.
The vendor's fourth acquisition in a year is designed to make its flagship Unicenter systems-management framework more useful and valuable to customers.
Microsoft CEO Stave Ballmer introduces new versions of Windows Server Update Service and Microsoft Update to make it easier for customers to find and download security patches and software updates.
Radware is introducing a new version of its DefensePro switch that's designed to inspect, analyze, and clean up encrypted SSL traffic before it enters a company's network.
Avinti's iSolation Server reroutes E-mail to a mirror network and checks each message for malware and other problems before it is released onto the regular company network.
The Percept firewall system helps the bank better monitor activity by authorized users, and issues alerts when someone is trying to access sensitive information such as Social Security numbers.
Vitas Healthcare deploys ID-management software from Fischer International for its 6,000 employees.
HP debuts a range of security services for the small- and midsize-business market.
M-Tech Information Technology introduces a software-based organizational chart to work with its ID-management system to help companies build and maintain accurate employee records.
The E-mails seem to be targeting victims of identity theft and try to get them to divulge information about their bank accounts.
Epok, IBM, and Mantissa unveil products to help businesses better manage access
Software from Elemental Security combines access control, policy management, and compliance features to make it easier for companies to improve data security and regulatory compliance.
Big Blue is making Mozilla's Firefox browser available to 300,000 employees.
Epok, IBM, and Mantissa are the latest software vendors to show new or upgraded products for a market that's expected to hit $1 billion by 2009.
Intellitactics and iDefense plan to integrate a security-management console with real-time information on global security threats to help businesses better protect their systems.
Remote code vulnerability found in the way Windows Explorer Web View handles certain HTML characters.
The Tivoli Federated Identity Manager is designed to securely extend the single-sign-on approach from internal systems to external business partners and suppliers.
Vontu provides content filtering and monitoring, and PGP provides encryption to make it easier to set up policies to automatically protect data.
The U.S. Department of Justice is funding a lab at the university to let businesses and others conduct security tests on simulated IT environments.
The software helps companies monitor, manage, and report on their compliance efforts.
The worm that hit this week is the 18th version of one that first surfaced two years ago. Businesses can prevent it from damaging their networks and computer systems by taking a few simple steps.
BorderWare Technologies introduces a new firewall that improves network performance while also providing security-policy enforcement and management, content control, and easy deployment.
The new platform is designed to make it easier for users to access a variety of applications from a range of client devices.
Forum Systems will integrate its XWall Web Services Firewall with Computer Associates' eTrust Antivirus software to fight viruses, worms, and other malware entering networks via XML, Soap, and attachments.
Upgraded authentication suite lets administrators set security levels and use fingerprints to replace multiple passwords.
Health-care company deploys a security appliance from Fortinet, along with the vendor's FortiReporter Security Analyzer for proactive monitoring and log reporting.
Barracuda Networks introduces a spyware-blocking and Web-content-filtering appliance designed to make it easier to keep the dangerous software off computers.
Five Microsoft vulnerabilities deemed critical
New system supports iSCSI, an emerging protocol that automatically converts blocks of data into a form that won't choke the IP network.
Trend Micro OfficeScan version 7.0 for viruses and spyware works at both client and server levels.
Capital IQ has applications tied to multiple processes and technology--complexity that can be hard to secure. But after trying multiple other products, Capital IQ recently got an early version of software that seems to do many things the previous products couldn't, including enabling IT to secure applications about 20% faster than before.
Logiscan 2.0 adds support for J2EE and Sparc processors, provides improved reporting, and integrates with the vendor's Logidex asset-management product.
Survey shows that business IT systems are suffering more damage and costly downtime due to viruses. Infections in 2004 were up 50% compared with a year earlier.
Security vendor now provides more information online and 24-by-7 access to certified technical security experts.
The vendor next week will add support for IBM's DB2 and Microsoft's SQL Server to its SecureDB database-security product.
Enterasys Networks and Lucent Technologies introduced a package of services designed to improve the security of IP telephony networks.
eIQnetworks rolls out an enterprise-scale security-management tool that monitors and responds to security alerts and events throughout an entire IT infrastructure.
E-Security will add Sentinel Control Packs to automatically collect and analyze compliance data, identify and respond to violations, and assess monitoring programs.
Network Intelligence enhances network security appliance to report on Sarbanes-Oxley compliance.
SFW Controller helps businesses and security firms manage and automate the gathering and analysis of building security data.
Systems-management vendor acquires identity-management company OpenNetwork Technologies for around $18 million in cash.
GreenBorder's software creates a duplicate network to let malicious software play while trusted traffic makes its way onto the real network.
EEye Digital Security introduces a revamped security suite aimed at service providers trying to secure multiple customers in real time.
Businesses suffered an average of 13.6 security attacks per day in the second half of 2004, up from 10.6 daily attacks in the first six months of the year, says the latest Internet Security Threat Report from security vendor Symantec.
Management tools help companies get a handle on their IT-security systems
Cloakware says its password-distribution software takes automation to a new level.
Microsoft issues white paper to detail how its AntiSpyware software works to identify and suppress potentially harmful software.
The state's judicial system deploys security software from Sygate to monitor traffic to network terminal.
The National Center for Missing and Exploited Children is battling a spyware problem wiith software from Computer Associates.
New Clariion systems show that EMC recognizes that iSCSI isn't a fad that's going away.
OneSwitch takes care of alerts and data replication, and it gives administrators a central view of Windows apps
With ECP Connect for eRoom, customers have access to live voice and video feeds, as well as Web conferencing.
A new file system supports business customers who are increasingly moving to Linux clusters.
New tools mean companies can increase availability without spending a lot of money.
Los Alamos National Laboratory uses object-based storage to achieve high levels of scalability.
Ease-of-use enhancements support the needs of professionals from systems administrators to CIOs.
Its new appliance offers hardware-based encryption and works across a variety of tape devices and backup software.
Software license revenue grew 43% in the storage vendor's most recent quarter.
Switch vendors including Brocade, Cisco, and McData will build virtualization intelligence into controllers for EMC hardware, a step that can help customers maintain a flexible storage architecture.
McData scoops up Computer Network Technology in an all-stock transaction worth about $235 million.
Cisco needs network-attached storage appliances in its bid to offer LAN-like performance over wide area networks.
The growth of the digital home may mean there's a place there for simple-to-use storage devices.
Nonprofit facility plans to transform its medical record-keeping system to electronic records this spring.