Brian Prince

SonicWall Speeds UTM Performance with Deep Packet Inspection Engine

SonicWall pulled the covers off a new feature company officials contend offers deeper insight into network traffic without compromising performance. Dubbed the SonicWall RFDPI 8 (Reassembly-Free Deep Packet Inspection 8) engine, the technology has been built into the company’s NSA (network security appliance) multicore products as a way to address security and bandwidth concerns brought […]

IBM Uncages Cheetah 2 Data Server

Less than a year after unleashing its “Cheetah” data server, IBM is set to release a new version of its software with enhanced availability. IDS (Informix Dynamic Sever) 11.5, code-named “Cheetah 2,” builds on the failover-recovery capabilities of its predecessor by now supporting full read/write transactions across all nodes. The last version of IDS only […]

Deepening Application Control with Firewalls

Palo Alto Networks is looking to distance itself from competing firewall vendors with new software that enhances application control and classification. The company’s PAN-OS 2.0 software, announced April 28, leverages and expands on the vendor’s App-ID technology to increase the user’s ability to dynamically classify and block applications. Enterprises can now filter applications according to […]

Understanding Data Security Risks of P2P

Peer-to-peer file transfers are increasingly a source of data leaks, and IT organizations may not be appreciating the risk. According to a survey by the Ponemon Institute of 750 IT professionals released the week of April 21, although 63 percent of respondents said their organizations forbid the use of P2P applications, only 5 percent said […]

Aruba Eases Wireless Intrusion Prevention

Aruba Networks is building new capabilities into its Wireless Intrusion Prevention System software that allows users to create their own detection signatures to improve security against zero-day attacks. The user-defined signatures are meant to address security vulnerabilities quickly, as opposed to waiting for a vendor to provide updates when a new attack has developed. The […]

Sun Asserts MySQL Will Remain Open Source

After several days of blog posts and headlines, the dust that kicked up over Sun Microsystems’ commitment to keeping MySQL open source seems to have settled. At the center of the controversy were reports of plans to close-source backup features in Version 6.0 of the MySQL database, making them available only to subscription-paying users of […]

AlgoSec Targets Security Weaknesses in VPN Configurations

AlgoSec has expanded the capabilities of its firewall analyzer to provide deeper insight into VPN settings to improve security and management. The technology, called AlgoSec VPN Analyzer, is meant to fill a gap in VPN products by helping users analyze their VPN settings for security weaknesses. It has been added to Version 4.3 of the […]

The Growing E-Mail Security Challenge

Scott Larsen has taken great pains to be able to sleep at night, confident that the e-mail systems at his workplace are being maintained and that the wall separating those systems from spam and phishing attacks still stands. But, as at many organizations, the wall guarding the e-mail systems at Larsen’s company-travel agency Groople-is constantly […]

IBM Database Business Keeps Growing

With all the talk surrounding IBM’s successful first quarter for 2008, the company’s data server business could get lost in the shuffle. But the release of IBM’s DB2 9.5 database is progressing well, according to Bernie Spang, director of IBM data servers. Though he would not break out revenues by product, Spang said the company’s […]

Middleware Eases Database Consolidation

Database consolidation may have just got a little easier, according to officials at ANTs Software. Roughly a year after demonstrating the technology at the Independent Oracle Users Group Collaborate 2007 conference in Las Vegas, the company has launched Version 1.5 of ACS (ANTs Compatibility Server), middleware designed to reduce the time and effort required to […]