SafeSquid lets you create unlimited and extremely granular Internet Policies to define and deal with unlimited number of unique factors...
Showing results 1 to 20 of 23
The Passpoint specification for seamless and secure wireless network authentication now has on-the-spot provisioning and more operator policy control.
While authentication is focused on who is allowed to have access to an application, or the network, for example, entitlements management is finer grained access control and intended to move beyond authentication.
There's a remote, pre-authentication, network-accessible code execution vulnerability in Microsoft's implementation of the RDP protocol.
All of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.
The most serious of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password.
ClearBox Enterprise RADIUS Server provides businesses with the strongest available Wi-Fi network security. The product enables centralized...
According to Oracle, 28 of these vulnerabilities could be remotely exploitable without authentication (over a network without the need for a username and password).
At a Churchill Club event in Mountain View, Calif., All Things Digital's Kara Swisher talks to David Kirkpatrick, author of "The Facebook Effect," about why the company is now the No. 1 social network. Kirkpatrick points to genuine identity and authentication, and a focus on technology as key factors for its success.
SafeSquid Personal is a Free Web Filter Proxy Server for Windows. SafeSquid Web Filter gives you Total Access Control, Total Content...
Risks to successful online banking identification and authentication using smartcards involve a mixture of human and technological factors, according to the European Network and Information Security Agency (Enisa).The agency launched a paper on Thursday detailing the risks of using electronic identification smartcards for online banking services.
If your company or organization runs an enterprise wireless LAN network, I have some troubling news for you. Odds are high that your current "enterprise-class" wireless LAN deployment is vulnerable to authentication leakage which not only exposes your internal network but all of your server access controls.
We recently installed a new firewall that will ultimately allow the high school to act as a hub for all district network traffic. Since we're the only building with the space, HVAC, and bandwidth to act as a de facto data center, this makes good sense and will allow for common authentication, distributed backups, and centralized anti-malware and content filtering.
RSA Security's proposed acquisition of privately held Cyota will allow the company to offer a relatively cheap two factor, non token-based authentication system for its banking customers. RSA is probably best known for its SecureID tokens, which are used by the majority of large corporates and government departments to provide users with two factor authentication for accessing their network.
Two serious security flaws in a technology widely used for network authentication could expose a swath of software products to hacker attack, experts have warned.The flaws could allow an online intruder to crash or gain access to computers running Kerberos, a freely available authentication technology that was developed by the Massachusetts Institute of Technology (MIT).
Optus plans to upgrade its mail server infrastructure to deal with increased e-mail traffic on its network caused by viruses on customers' machines.A spokesperson for the telco confirmed the increased traffic had caused some customers to experience 'Re-authentication errors' when checking their e-mail.
The NSW police service is planning to beef up its security by consolidating its disparate identification systems and firewall management.The service is currently using two-factor authentication tokens from Vasco to secure on-the-road access to its internal network.
Secure Network Authentication Platform lets users log into Windows networks with fingerprints instead of passwords.
Telstra has blamed an upgrade of "a core part" of BigPond's IP network as behind authentication problems that frustrated users across the eastern states this morning.A spokesperson for the telecommunications heavyweight said the authentication process was slowed between 10:20am and 1pm, forcing customers in Queensland, NSW and Victoria to make several attempts to log in before they could do so successfully.
VeriSign CEO Stratton Sclavos describes Open Authentication Reference Architecture, a new standard for user authentication and network access control at the RSA Security Conference in San Francisco.
Bridgewater Systems brings its network ID know-how to the quest by the Sun-led online-authentication coalition to set a standard.
Security is the biggest obstacle to deploying XML Web services. Traditional network firewalls won't do the job. You need the authentication and access control of an XML application firewall.
At this year's Windows Hardware Engineering Conference, Microsoft announced that the upcoming Windows XP will support the emerging IEEE 802.1x authentication standard, which ensures a client is properly authorized by the network before allowing access.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)