SonicWall pulled the covers off a new feature company officials contend offers deeper insight into network traffic without compromising performance. Dubbed the SonicWall RFDPI 8 (Reassembly-Free Deep Packet Inspection 8) engine, the technology has been built into the company’s NSA (network security appliance) multicore products as a way to address security and bandwidth concerns brought […]
Less than a year after unleashing its “Cheetah” data server, IBM is set to release a new version of its software with enhanced availability. IDS (Informix Dynamic Sever) 11.5, code-named “Cheetah 2,” builds on the failover-recovery capabilities of its predecessor by now supporting full read/write transactions across all nodes. The last version of IDS only […]
Palo Alto Networks is looking to distance itself from competing firewall vendors with new software that enhances application control and classification. The company’s PAN-OS 2.0 software, announced April 28, leverages and expands on the vendor’s App-ID technology to increase the user’s ability to dynamically classify and block applications. Enterprises can now filter applications according to […]
Peer-to-peer file transfers are increasingly a source of data leaks, and IT organizations may not be appreciating the risk. According to a survey by the Ponemon Institute of 750 IT professionals released the week of April 21, although 63 percent of respondents said their organizations forbid the use of P2P applications, only 5 percent said […]
Aruba Networks is building new capabilities into its Wireless Intrusion Prevention System software that allows users to create their own detection signatures to improve security against zero-day attacks. The user-defined signatures are meant to address security vulnerabilities quickly, as opposed to waiting for a vendor to provide updates when a new attack has developed. The […]
After several days of blog posts and headlines, the dust that kicked up over Sun Microsystems’ commitment to keeping MySQL open source seems to have settled. At the center of the controversy were reports of plans to close-source backup features in Version 6.0 of the MySQL database, making them available only to subscription-paying users of […]
AlgoSec has expanded the capabilities of its firewall analyzer to provide deeper insight into VPN settings to improve security and management. The technology, called AlgoSec VPN Analyzer, is meant to fill a gap in VPN products by helping users analyze their VPN settings for security weaknesses. It has been added to Version 4.3 of the […]
Scott Larsen has taken great pains to be able to sleep at night, confident that the e-mail systems at his workplace are being maintained and that the wall separating those systems from spam and phishing attacks still stands. But, as at many organizations, the wall guarding the e-mail systems at Larsen’s company-travel agency Groople-is constantly […]
With all the talk surrounding IBM’s successful first quarter for 2008, the company’s data server business could get lost in the shuffle. But the release of IBM’s DB2 9.5 database is progressing well, according to Bernie Spang, director of IBM data servers. Though he would not break out revenues by product, Spang said the company’s […]
Database consolidation may have just got a little easier, according to officials at ANTs Software. Roughly a year after demonstrating the technology at the Independent Oracle Users Group Collaborate 2007 conference in Las Vegas, the company has launched Version 1.5 of ACS (ANTs Compatibility Server), middleware designed to reduce the time and effort required to […]