Authentication+network

Showing results 1 to 20 of 23

SafeSquid Business Edition

SafeSquid lets you create unlimited and extremely granular Internet Policies to define and deal with unlimited number of unique factors...

July 1, 2012 by Office Efficiencies

ClearBox Enterprise RADIUS Server

ClearBox Enterprise RADIUS Server provides businesses with the strongest available Wi-Fi network security. The product enables centralized...

March 20, 2012 by XPerience Technologies

Facebook's competitive advantage

At a Churchill Club event in Mountain View, Calif., All Things Digital's Kara Swisher talks to David Kirkpatrick, author of "The Facebook Effect," about why the company is now the No. 1 social network. Kirkpatrick points to genuine identity and authentication, and a focus on technology as key factors for its success.

June 28, 2010 by

SafeSquid Personal

SafeSquid Personal is a Free Web Filter Proxy Server for Windows. SafeSquid Web Filter gives you Total Access Control, Total Content...

February 20, 2012 by Office Efficiencies

Authentication risks all too human

Risks to successful online banking identification and authentication using smartcards involve a mixture of human and technological factors, according to the European Network and Information Security Agency (Enisa).The agency launched a paper on Thursday detailing the risks of using electronic identification smartcards for online banking services.

November 27, 2009 by

New tool cracks most enterprise wireless LANs

If your company or organization runs an enterprise wireless LAN network, I have some troubling news for you.  Odds are high that your current "enterprise-class" wireless LAN deployment is vulnerable to authentication leakage which not only exposes your internal network but all of your server access controls.

March 5, 2008 by

The firewall is a little restrictive, don't you think?

We recently installed a new firewall that will ultimately allow the high school to act as a hub for all district network traffic. Since we're the only building with the space, HVAC, and bandwidth to act as a de facto data center, this makes good sense and will allow for common authentication, distributed backups, and centralized anti-malware and content filtering.

February 25, 2008 by

Cyota gives RSA token-less authentication

RSA Security's proposed acquisition of privately held Cyota will allow the company to offer a relatively cheap two factor, non token-based authentication system for its banking customers. RSA is probably best known for its SecureID tokens, which are used by the majority of large corporates and government departments to provide users with two factor authentication for accessing their network.

December 7, 2005 by

Flaws could open systems to attack

Two serious security flaws in a technology widely used for network authentication could expose a swath of software products to hacker attack, experts have warned.The flaws could allow an online intruder to crash or gain access to computers running Kerberos, a freely available authentication technology that was developed by the Massachusetts Institute of Technology (MIT).

July 13, 2005 by

Virus attacks prompt Optus server upgrade

Optus plans to upgrade its mail server infrastructure to deal with increased e-mail traffic on its network caused by viruses on customers' machines.A spokesperson for the telco confirmed the increased traffic had caused some customers to experience 'Re-authentication errors' when checking their e-mail.

May 23, 2005 by

NSW police beef up identification, firewall protection

The NSW police service is planning to beef up its security by consolidating its disparate identification systems and firewall management.The service is currently using two-factor authentication tokens from Vasco to secure on-the-road access to its internal network.

May 12, 2005 by

Telstra blames upgrade for BigPond problems

Telstra has blamed an upgrade of "a core part" of BigPond's IP network as behind authentication problems that frustrated users across the eastern states this morning.A spokesperson for the telecommunications heavyweight said the authentication process was slowed between 10:20am and 1pm, forcing customers in Queensland, NSW and Victoria to make several attempts to log in before they could do so successfully.

May 30, 2004 by

Security takes an OATH

VeriSign CEO Stratton Sclavos describes Open Authentication Reference Architecture, a new standard for user authentication and network access control at the RSA Security Conference in San Francisco.

February 26, 2004 by

XML Web services need a firewall

Security is the biggest obstacle to deploying XML Web services. Traditional network firewalls won't do the job. You need the authentication and access control of an XML application firewall.

July 28, 2002 by

Microsoft deploys wireless security on XP

At this year's Windows Hardware Engineering Conference, Microsoft announced that the upcoming Windows XP will support the emerging IEEE 802.1x authentication standard, which ensures a client is properly authorized by the network before allowing access.

April 4, 2001 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories