networks

Review: Nortel VPN Gateway 3050

Review: Nortel VPN Gateway 3050

Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ourselves looking through different guides trying to locate configuration information. The absence of a quickstart card or a getting started guide makes this task even more difficult.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 1 2006 12:00AM Security
Review: SonicWall SSL VPN 2000

Review: SonicWall SSL VPN 2000

Once the interfaces are configured for the network in a quick and easy setup process, the SonicWall appliance is administrated via the web interface. This interface starts with the system dashboard, which shows all system information in a user-friendly layout. The web interface organises all tasks on the left side of the screen in several tabs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Recruitment: People on the move - Appointment at ConSentry
Networks

Recruitment: People on the move - Appointment at ConSentry Networks

Former Juniper Networks man Dan Leary has joined ConSentry Networks as vice-president of marketing. The appointment comes at a time of fundamental change in the way enterprises build LANs. www.consentry.com.
Staff Writers Sep 4 2006 3:56PM Security
Recruitment - People on the move - Appointment at Enterasys
Networks

Recruitment - People on the move - Appointment at Enterasys Networks

Leon Woo has been promoted to executive vice-president and chief technology officer at Enterasys Networks.
Staff Writers Aug 14 2006 2:44PM Security
Recruitment - People on the move - Appointment at Trapeze networks

Recruitment - People on the move - Appointment at Trapeze networks

Trapeze networks, which offers wireless networking products for the enterprise, has named Douglas Laird its vice president of worldwide marketing.
Staff Writers Aug 14 2006 2:44PM Security
Social networks riddled with malware

Social networks riddled with malware

One in 600 profiles host infection.
Will Head Aug 11 2006 1:48PM Security
'Evolved' worms target all IM networks

'Evolved' worms target all IM networks

Threat growing rapidly, experts warn.
Robert Jaques Aug 11 2006 1:47PM Security
Networks to be accountable in mobile phone theft

Networks to be accountable in mobile phone theft

New charter aims to reduce mobile phone crime.
William Eazel Jul 31 2006 1:53PM Telco/ISP
Wireless networks growing in popularity

Wireless networks growing in popularity

Companies want network technology to help increase productivity, says Gartner.
Staff Writers Jul 10 2006 1:49PM Networking
Newspaper: Fed networks under attack, but security improvements years behind schedule

Newspaper: Fed networks under attack, but security improvements years behind schedule

A federal program to protect confidential information within the computer networks of various federal agencies is seven years behind schedule, the Baltimore Sun has reported.
Dan Kaplan Jul 5 2006 8:37PM Security
Half of London Wi-Fi networks open to hackers

Half of London Wi-Fi networks open to hackers

Nearly half of wireless networks in London are open to attack, according to new research.
René Millman May 24 2006 2:45PM Security
Hackers seek mobile phone doorway to networks

Hackers seek mobile phone doorway to networks

Hackers are turning to mobile phones as a means of breaking into corporate networks, according to security experts.
René Millman Mar 30 2006 2:24PM Security
Six of ten WiFi networks are insecure

Six of ten WiFi networks are insecure

Almost 60 percent of WiFi networks have no security system at all, according to Panda Software in its "Security in Wireless Networks" report.
William Eazel Mar 16 2006 4:57PM Security
SSL tunnels create ‘invisible’ backdoors into corporate networks

SSL tunnels create ‘invisible’ backdoors into corporate networks

Encrypted Secure Socket Layer (SSL) communications between internal corporate employees and external internet applications is "invisible" to companies and so comprises a "risk to the enterprise," new research has claimed.
William Eazel Mar 9 2006 10:06AM Security
The threat from anonymous networks

The threat from anonymous networks

Eliminating anonymous traffic on corporate networks is vital to securing infrastructure, according to experts.
Rene Millman Feb 23 2006 10:34AM Security
Perimeter Internetworking beefs up security, acquires US Networks

Perimeter Internetworking beefs up security, acquires US Networks

Perimeter Internetworking, a provider of managed network and security services for community financial institutions, healthcare companies and service providers has acquired the assets of US Networks Inc., a managed network and security services provider headquartered in Raleigh, NC.
William Eazel Nov 28 2005 10:43AM Security
Hackers up pressure on P2P networks

Hackers up pressure on P2P networks

A newly published security report has identified 22 previously undocumented Peer to Peer (P2P) attacks in October which were targeted at networks including Kazaa and eDonkey. The study from Instant Messaging (IM) security firm Akonix Systems indicates a 19 percent increase in malicious P2P exploits compared with the volume recorded in September 2005.
William Eazel Nov 1 2005 10:49AM Security
Companies struggle to secure wireless networks

Companies struggle to secure wireless networks

Corporate wireless networks are being left open to hackers as companies struggle to implement adequate security measures, a study claims.
René Millman Aug 3 2005 1:23PM Security
Debate» Voice over IP networks pose a security threat to enterprises and their users

Debate» Voice over IP networks pose a security threat to enterprises and their users

David Endler Jul 22 2005 3:27PM Security
Nortel defends deal discounting

Nortel defends deal discounting

Networking vendor Nortel has defended its practice of heavily discounting hardware deals to win contracts in mid-size to larger Australian organisations.
Fleur Doidge Jul 19 2005 4:45PM Networking

Log In

  |  Forgot your password?