Internet Security Systems this week is expected to take the wraps off two intrusion-prevention systems – the Proventia G400 and G2000 – designed to block spyware and hundreds of types of attacks. With ...
SANTA CLARA, Calif.--(BUSINESS WIRE)--McAfee today announced the release of its McAfee Network Security Platform NS-series, a new network intrusion prevention system (IPS) appliance based on Intel ...
Independent security research and testing firm NSS Labs today released its most recent Network Intrusion Prevention System (IPS) Comparative Group Test Report for the fourth quarter of 2010. The ...
Nokia FP5 network processing silicon delivers a generational leap in IP network capacity and power efficiency while introducing new capabilities for protecting network traffic from security threats ...
Researchers are warning about the risks posed by a low-cost device that can give insiders and hackers unusually broad powers ...
Stamus Networks today announced the general availability of SELKS 10, the latest version of its turnkey Suricata-based network intrusion detection/protection (IDS/IPS), network security monitoring ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. An intrusion prevention system ...
McAfee is using the Interop show in Las Vegas to launch a new intrusion prevention system (IPS) for 10-gigabit Ethernet networks and the integration of several other products. McAfee IntruShield 10 ...
Zscaler is launching a Bring Your Own IP (BYOIP) capability, letting enterprises use their own IP address ranges for internet egress through its cloud security platform. The vendor already offers ...
Compare the top 5 Linux-friendly network security providers for small businesses. Discover reliable tools, features, and protection solutions designed for Linux environments.
As we watch the tragedy unfold in Ukraine, security professionals are all too aware that Russia has built a massive cyber warfare arsenal and has been willing to use it against its perceived ...
Hardware security vulnerabilities have greatly expanded the attack surface beyond traditional software exploits, making hardware security assurance crucial in modern system-on-chip (SoC) designs. Chip ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results