About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
What's up IT?
Cisco buying security start-up
Monday, 15 March 2004 13:50 EST

Cisco Systems plans to buy security start-up Twingo Systems for $5m to bolster network defences at their outer limits. The all-cash deal, announced on Friday, is small by Cisco’s standards but Twingo would provide the networking giant with a key technology to round out its remote access security suite. For the past several months, Cisco has been beefing up its security offering and adding new capabilities to routers.

The company's vision of a 'self-defending' network relies on network-level protection, as well as improved 'end point' security - that is, safeguards at the desktop level. Last year, the company acquired Okena, which identifies and quarantines malicious code on end points to help prevent the spread of viruses and worms. Cisco also began working with several antivirus vendors, including Network Associates, Symantec and Trend Micro, to introduce a product that would check to make sure that a device wasn't infected with a virus before allowing it to connect to a network. Last month, Cisco extended the relationship to include IBM.



Featured Articles

Software application development has only been around since the late 1970s. Compared to other industries and professions, the software industry is still very young. Ever since organizations began to use computers to support their business tasks, the people who create and maintain those “systems” have become more and more sophisticated and specialized.

A new Trojan horse is designed to produce forge Google ads that are formatted to look like legitimate ones. The Trojan attempts to incorporate its ads in Google AdSense publishers program. Once installed, the Trojan horse downloads itself onto the computer and replaces the original ads with its own ads.

According to Burton Group, identity federation can be defined as ‘the agreements, standards and technologies that make identity and entitlements portable’. There are three main federation models - simple (point-to-point), hub and spoke (uni or bi-lateral) and circle of trust (many-to-many).

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




Press Releases

Parasoft Jtest Wins Best Application Test Tool as part of InfoWorld's Annual Technology of the Year Awards
Akonix Security Center Publishes IM Threat Watch for December 2005
Tool for camouflaging threats in WMFs discovered, informs Panda Software

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter