[metaslider id=2951] … Read More
Archives for March 2013
LogPoint has released version 5.1.2.
The highlights for this release include a number of enhancements. A selection of these are outlined below:
- Fresh new colour theme for web interface
- Snare Agent collector is added to collect events from windows server on its native port 6161
- Alert and correlation rules can be transferred to LDAP Users
- Selected repos and time-range for the last search is remembered
- NetFlow templates are stored and indesxed together with NetFlow Data Packets
- User can select the number of logs to be reported for “Simply Search Query” in the report template wizard
The Snare System version 6 has been released since October. This update version has a number of enhanced features such as drag and drop objectives, improved reporting, robust collection. Intersect Alliance is currently offering the system with a discount, available until April 15, 2013. This promotion provides for a Snare Server with 25 Enterprise Snare Agents at almost 50% off the MSRP pricing. If you are interest, please contact us to register your interest and secure the pricing.
Mobile devices make life easier for your users. But how do you strike a balance between security and productivity?
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices. MDM solutions should also simplify administration while enhancing mobile security. But do you know what features to look for? How do you choose the right one?
This Mobile Device Management Buyers Guide explains the product features and capabilities you should look for when considering your options.
This guide gives you the information you need to:
- Ask the right questions of vendors
- Look for the right capabilities and features
- Make the right choice for your business
By John H. Sawyer, Dark Reading
Of all the IT elements that you must secure in your organization, the endpoints are the most elusive. A flaw in an end user device can lead to a breach at the very core of your business, so hardening those endpoints is key to preventing those breaches.
Endpoints are as hard to define as they are to protect. The term traditionally referred to desktops and laptops, but endpoints now encompass smartphones, tablets, point-of-sale machines, bar code scanners, multifunction printers and practically any other device that connects to the company network. Without a well-conceived strategy, keeping track of and securing these devices is difficult and frustrating. [Read More]
Dan Kaplan, Executive Editor – SC Magazine
In what has become a familiar refrain, security researchers have spotted another Java zero-day vulnerability under active attack.
Network security company FireEye said the vulnerability being exploited in the wild is present in the most up-to-date versions of Java SE software: version 6 Update 41 and version 7 Update 15, researchers Darien Kindlund and Yichong Lin wrote in a blog posted Thursday. [Read More]