Home security
 

Keywords :   


Tag: security

Security concerns prompt subpoena for HealthCare.gov data

2013-10-29 22:22:41| InfoWorld: Top News

A U.S. House committee chairman, citing security concerns, today ordered a HealthCare.gov contractor to provide detailed information about its work on the project.

Tags: data security concerns prompt

 

Adobe security breach could compromise 38 million users

2013-10-29 22:16:56| InfoWorld: Top News

This month's security breach at Adobe is turning out to be much more widespread than the company first let on. At least 38 million users have been affected by the early October incident.

Tags: users security million adobe

 
 

Security Software automates network layer changes.

2013-10-29 13:29:35| Industrial Newsroom - All News for Today

Comprising Firewall Management, Network Change Automation, and Application Connectivity Management modules, Tufin Orchestration Suite™ R13-3 offers central management of enterprise firewalls, routers, and load-balancers from all major vendors. Program provides network path simulation and automatic identification of relevant network devices, as well as automatic verification and documentation of every change. Multiple, customizable workflows automate best practices and organizational processes. This story is related to the following:Network Workflow Software | Data Security Software

Tags: software network security layer

 

Data Backup/Recovery Software optimizes scalability, security.

2013-10-29 13:29:35| Industrial Newsroom - All News for Today

Offering alternative to legacy ARC-based backup and recovery (BAR) architecture, Teradata Data Stream Architecture optimizes data streaming in and out of Teradata database to accelerate BAR operations. Incremental backup reduces duration of backup activities, while temperature- and compression-aware features for hot and cold data allow data to be restored to same temperature and compression states. Other features include Viewpoint BAR portlets and Teradata authentication channels. This story is related to the following:Disaster Recovery Software

Tags: data software security scalability

 

New RSA Products and Services Improve Security Operations; Eliminate Security and Compliance ...

2013-10-29 06:00:00| Industrial Newsroom - All News for Today

New RSA Security Analytics and RSA Security Operations Management Solutions Marry SIEM with Advanced Security Capabilities<br /> <br /> AMSTERDAM &mdash; RSA CONFERENCE EUROPE 2013<br /> <br /> -  New products and services help organizations build and advance their security operations functions while expanded visibility provides the ability to respond to incidents quicker and reduce the business impact.<br /> -  Enhanced RSA Security Analytics solution addresses SIEM and compliance ...This story is related to the following:ServicesSearch for suppliers of: Data Security Software | Remote Network Services

Tags: services products security improve

 

Sites : [639] [640] [641] [642] [643] [644] [645] [646] [647] [648] [649] [650] [651] [652] [653] [654] [655] [656] [657] [658] next »