Kerio Launches Connect 7.3, a Complete, Platform Agnostic, and Mobile Aware Messaging Server
An Alternative Email Solution to Microsoft Exchange and Google Apps, Kerio Connect 7.3 Provides Flexibility to the Midsize Organizations
SAN JOSE, Calif., November 8, 2011 – Kerio Technologies, Inc. today announced Kerio Connect 7.3, the latest release of its messaging and collaboration server that provides email, contacts and calendar management to more than 50,000 organizations worldwide. With deployment options for Windows, Mac OS X, Linux, VMware and Parallels, Kerio Connect is ready to run in virtually any in-house or private cloud customer environment.
09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...21.01.2018 Security and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.1 Fix Pack 6a Flash (Alert) Abstract Fix Pack 6a for DB2 V9.1 is now available which includes fixes for some serious vulnerabilities. These fixes, where applicable, are also available in Fixpak 3 for DB2 Version 9.5, Fix Pack 6 for DB2 Version 9.1, and FixPak 17 for DB2 Universal Database™ (DB2 UDB) Version 8.1 (also known as FixPak 10 for DB2 UDB Version 8.2), IBM® recommends that you review the vulnerability descriptions and deploy one of the above fix packs to remove the vulnerabilities on your affected DB2 installations. Content A set of secur...07.04.2018 KERIO CONNECT СЕРТИФИЦИРОВАН ДЛЯ РАБОТЫ ПОД WINDOWS 7 И WINDOWS SERVER 2008 7 апреля 2010г., Москва — Компания Kerio Technologies Inc., известная своими инновациями в области информационной безопасности и организации систем электронной почты, сегодня объявила о получении Kerio Connect двух сертификатов для работы под Windows. Kerio Connect теперь удовлетворяет всем критериям для полной совместимости с операционными системами Windows Server 2008 R2 и Windows 7. В Kerio Connect 7 реализована технология распределенного кластерного домена, позволяющая унифицировать управление взаимодействием филиалов компаний-клиентов с общим для них доменом.18.11.2018 Kerio Connect улучшает производительность, удобство пользования и управление электронной почтой. Сегодня компания Kerio Technologies выпустила Kerio Connect 9.0, дополнив свое решение для обмена сообщениями и совместной работы средствами повышения производительности работы, которые экономят время.02.02.2018 Kerio Technologies Launches New Kerio Cloud Infrastructure to Better Support Small and Mid-sized Businesses New Kerio Cloud infrastructure enables Value Added Resellers to build a profitable cloud communications business.25.08.2018 CVE-2008-3778 The remote management interface in SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, proceeds with Core router updates even when a login is invalid, which allows remote attackers to cause a denial of service (messaging outage) or gain privileges via an update request.09.11.2018 2008-11-08 - [slackware-security] cups (SSA:2008-312-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] cups (SSA:2008-312-01)New cups packages are available for Slackware 12.0, 12.1, and -current tofix security issues.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641Here are the details from the Slackware 12.1 ChangeLog:+-------------------...15.01.2018 2009-01-14 - [slackware-security] openssl (SSA:2009-014-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] openssl (SSA:2009-014-01)New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2,and -current to fix a security issue when connecting to an SSL/TLS serverthat uses a certificate containing a DSA or ECDSA key.More details about this issue may be found here: http://www.openssl.org/news/secadv_20090107.txt http://www.ocert.org/advisories/ocert-2008-016.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077Here are the details from the Slackware 12.2 Change...06.01.2018 2009-01-05 - [slackware-security] samba (SSA:2009-005-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] samba (SSA:2009-005-01)New samba packages are available for Slackware 12.2 and -current to fix asecurity issue.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022Here are the details from the Slackware 12.2 ChangeLog:+--------------------------+patches/packages/samba-3.2.7-i486-1_slack12.2.tgz: Upgraded to samba-3.2.7. This fixes a security issue. &n...04.06.2018 2009-06-03 - [slackware-security] ntp (SSA:2009-154-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] ntp (SSA:2009-154-01)New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,11.0, 12.0, 12.1, 12.2, and -current to fix security issues.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252Here are the details from the Slackware 12.2 ChangeLog:+--------------------------+patches/packages...
Нет комментариев. Почему бы Вам не оставить свой?
Вы не можете отправить комментарий анонимно, пожалуйста зарегистрируйтесь.