Смотрите также связанные темы 05.04.2018 Блог: Sophos расширяет «мобилизацию» своих решений Компания Sophos объявила о заключении соглашения по выкупу DIALOGS Software, немецкого поставщика корпоративных решений для управления мобильными устройствами (mobile device management, MDM).
12.03.2018 Leading Industry Analyst Firm Includes Kerio Control in its Magic Quadrant for Unified Threat Management Kerio’s UTM Appliance Provides Comprehensive Network Security and Intelligence SAN JOSE, CA, March 12, 2012 – Kerio Technologies today announced that it has been placed in Gartner, Inc.'s March 2012 Unified Threat Management Magic Quadrant. The global analyst firm defines the UTM market as devices that provide small and midsize businesses with multiple network security functions in a single appliance. read more
09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
03.01.2018 CVE-2015-4946 Rational LifeCycle Project Administration in Jazz Team Server in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Quality Manager (RQM) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Team Concert (RTC) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Requirements Composer (RRC) 3.x before 3.0.1.6 IF7 and 4.x before 4.0.7 IF9; Rational DOORS Next Generation (RDNG) 4.x ...
07.02.2018 CVE-2015-6398 Cisco Nexus 9000 Application Centric Infrastructure (ACI) Mode switches with software before 11.0(1c) allow remote attackers to cause a denial of service (device reload) via an IPv4 ICMP packet with the IP Record Route option, aka Bug ID CSCuq57512.
25.10.2018 Mobile Phones Are Vulnerable to Attack We just posted a new feature article on the McAfee Security Advice Center called: Tips for Safeguarding Your Mobile Phone from Malware.
Check it out and you’ll find 8 tips to keep your mobile device safe from cyber attacks.
Also, you will find an invitation to download a new product called McAfee Mobile Anti-Theft (BETA) - [...]
27.10.2018 Consumerization Defines a New IT Security Reality According to Raghu Raghuram of VMware, 20-25% of users access enterprise services through private computers today. This proportion is growing quickly with mobile access, new service delivery strategies, and a Gen X/Y workforce molded by mobile devices and social networks.
Gartner has coined the term “consumerization” for the reality that unmanaged endpoints and consumer-based services have [...]
31.12.2018 HPSBST02397 SSRT080187 rev.1 - Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-078 Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA).
21.01.2018 Security and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.1 Fix Pack 6a Flash (Alert) Abstract Fix Pack 6a for DB2 V9.1 is now available which includes fixes for some serious vulnerabilities. These fixes, where applicable, are also available in Fixpak 3 for DB2 Version 9.5, Fix Pack 6 for DB2 Version 9.1, and FixPak 17 for DB2 Universal Database™ (DB2 UDB) Version 8.1 (also known as FixPak 10 for DB2 UDB Version 8.2), IBM® recommends that you review the vulnerability descriptions and deploy one of the above fix packs to remove the vulnerabilities on your affected DB2 installations. Content A set of secur...
|