Смотрите также связанные темы 16.11.2018 Kerio Announces Kerio Control Box, Unified Threat Management Hardware Appliance Two new hardware options further expand the flexibility Kerio offers to SMBs looking to deploy a complete network security solution. SAN JOSE, California – November 30, 2010 – Kerio Technologies today unveils the latest addition to its Kerio Control gateway security product line, Kerio Control Box. Building upon a 13-year heritage of networking technology development, the newly updated UTM hardware solution is based on Kerio Control 7.1, the latest version of Kerio’s award winning security software. Kerio Control Box offers network administrators a turnkey solution to manage user access,...
13.06.2018 Latest attacks underline growing threat to governments Two members of the House of Representatives on Wednesday said their computer systems were broken into, the latest in a series of cybersecurity alarms raised by the government.
The lawmakers suggest that the break-ins were carried out by people who appear to be working from inside China seeking confidential lists of names of dissidents.
Virginia Rep. Frank Wolf [...]
15.02.2018 На что способна киберразведка. Часть 1. Тактика и стратегия Group-IB, первый российский поставщик threat intelligence решений, вошедший в отчеты Gartner, открывает цикл статей о киберразведке и ее реальных возможностях. В первом материале цикла Виктор Ивановский, BDM сервиса Bot-Trek Intelligence, предлагает определиться с терминологией.
24.09.2018 Kerio Announces Streamline Integration as a Preferred Partner in the Western US Region Denver-based IT Consulting Partner Reaches Highest Business Milestone
with its Service to SMBs
31.10.2018 Another Record Quarter for McAfee Yesterday we announced our financial results for Q3 08. We are pleased to report that despite the current economic environment, our customers continue to view our technology as a “must-have.” Our relentless focus on security leadership has enabled us to provide our customers with innovative technology in a growing threat environment, increased manageability and an [...]
05.02.2018 Is information security compliance really a cost center? No. Absolutely and unequivocally not. I am drawing the line in the sand. Business leaders need to understand there is no more need for proper security to justify itself over and over again. It saves you time and money (period).
Properly implemented information security provides business process improvement, technology improvement and threat reduction. Compliance controls that [...]
15.04.2018 Обнаружен первый SMS-червь Компания F-Secure в своем квартальном отчете о вопросах безопасности IT Security Threat Summary, сообщает об обнаружении «первого SMS-червя», заражающего сотовые телефоны.
08.05.2018 Disgruntled Employee or Cybercriminal? Our recent report entitled Unsecured Economies: Protecting Vital Information cited survey results that shed light on the changing "face" of the threat horizon. These results confirm once again that the top threat to information comes from the people within, the very people that we employ or welcome inside our systems as partners and contractors. But the report also indicated some new texture on this topic in the context of the current economic downturn, namely that laid-off employees and financially-strapped employees were top concerns within the insider threat category.
27.04.2018 Kerio Introduces New Kerio WinRoute Firewall 6.6 SAN JOSE, Calif., — March 31, 2009 — Kerio Technologies, Inc., a leading innovator in Internet security and messaging, today announced a new version of Kerio WinRoute Firewall, a Windows-based Unified Threat Management (UTM) gateway security solution. This version premieres a cross-platform Kerio VPN Client for Windows, Mac OS X, and Linux, addressing a growing need to provide secure VPN connectivity to the mobile workforce with diverse OS platforms.
30.11.2018 A Chilling Reminder of the Internal Threat T-Mobile reminds us of how serious the internal threat can be, in what U.K. authorities are dubbing one of the biggest data breaches in that region's history.
|