CRN Security News

  • A Growing Trend In Security: Disk-Based Backup Restorations
    Backup technology needs to be reliable and easily integrated, among other things. Idealstor's channel-friendly program and turnkey backup-and-restore offering provides partners with a complete backup system that addresses all of these needs.
  • Time To Fire It Up
    Without the sweat of patent litigation on its brow, unified threat management vendor Fortinet has a rare chance to once again generate some heat in the small-business security channel. But the company has some flames to stoke if it hopes to regain to its former stature.
  • Early Version Of Linksys One Comes Up Short
    Cisco Systems&' Linksys division says it&'s still on track for a nationwide rollout this fall of the Linksys One hosted VoIP offering for small businesses, but several partners who recently saw live demonstrations of the product said the current version falls short of their expectations.
  • IronPort launches new technology to assess trustworthiness of embedded links

    Beefing Up E-Mail Security
    In an effort to get tougher on spam and phishing attacks, e-mail security vendor IronPort Systems has launched a new capability that enables its appliances to assess the trustworthiness of Web links embedded in e-mails. The vendor&'s new Web Reputation technology, rolled out this month, aims to increase the antispam functionality of its e-mail security appliances and is supported by its SenderBase Network security database.
  • Countdown On For Kama Sutra
    The clock continues to tick toward the anticipated destruction of Microsoft Office documents, Adobe files, and backup archives. Security companies scramble to post their latest research on the Kama Sutra worm.
  • Defensive Play: Virtual Patching, Intrusion Prevention Come Of Age
    Patch management: It's the blight of companies that rely on software to make their businesses hum. And there's probably no greater drain on IT resources than the persistent need to patch vendor-announced flaws that place critical systems at risk to attack from viruses, worms and hackers.
  • FAQ: How Bad Is Kama Sutra?
    Sometime on Friday computers already infected with the Kama Sutra worm will start writing over important documents, rendering them useless and potentially causing catastrophic damage to consumers and businesses. Here's what you need to know.
  • Messaging Security Concerns On the Rise
    For better or worse, e-mail security is off to a booming start in 2006, figuring to be a top-of-mind issue for vendors, customers and solution providers all year.
  • Mass. Names New CIO, Hardens OpenDocument Policy
    The Bay State has named Louis Gutierrez to fill the position of CIO in the Information Technology Division and reiterated its support for a previously announced plan to implement the OpenDocument format in state agencies in January.
  • 'Extremely Critical' Exploit Hits Winamp
    The popular Winamp music player suffers from a zero-day vulnerability that attackers are already exploiting, a security company warns. A patch is not available.
  • Security Vendors Aim For Standard Spyware Testing
    McAfee, Symantec, Trend Micro, ICSA Labs, and Thompson Cyber Security Labs will collaborate on creating standard spyware testing methods in an attempt to bring some order to a mixed-up security jumble.
  • Check Point Posts Strong 4Q Profit; Sourcefire Deal Delayed
    Check Point Software Technologies closed the books on 2005 with a 17 percent year-over-year gain in fourth-quarter earnings. But company executives said Monday that a delay in closing the Sourcefire acquisition clouds Check Point&'s 2006 plans.
  • System builders can develop a new customer base by installing speech technology, and training users to actually make it productive

    Listen Up! Speech Recognition Comes of Age
    System builders can develop a new customer base by installing speech technology, and training users to actually make it productive.