Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Secure computing

Related Topics

  Computer security - Wikipedia, the free encyclopedia
Computer security is a field of computer science concerned with the control of risks related to computer use.
Computer security can be seen as a subfield of security engineering, which looks at broader security issues in addition to computer security.
Computer security is a highly complex field, and it is relatively immature, except on certain very secure systems that never make it into the news media because nothing ever goes wrong that can be publicized, and for which there is not much literature because the security details are proprietary.
en.wikipedia.org /wiki/Secure_computing   (2204 words)

 Next-Generation Secure Computing Base - Wikipedia, the free encyclopedia
The Next-Generation Secure Computing Base (NGSCB), formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement controversial parts of their "Trustworthy Computing" concept on future versions of the Microsoft Windows operating system.
Microsoft's stated aim for NGSCB is to increase the security and privacy of computer users[1], but critics assert that the technology will not only fail to solve the majority of contemporary IT security problems, but also result in an increase in vendor lock-in and a resulting reduction in competition in the IT marketplace.
However, a secure method for the owner to identify themselves would be provided, and through this method the owner would be able to force the TPM to make a false attestation or decrypt data for an application that would not otherwise be allowed access to that data.
en.wikipedia.org /wiki/Next-Generation_Secure_Computing_Base   (1657 words)

 Secure Computing Corporation and John McNulty: Admin. Proc. Rel. No. 34-46895 / November 25, 2002
Secure's stock closed at $17.40 per share on that day, an increase of 8% over the previous day's close, on trading volume that was more than double that of the day before.
Secure's stock price closed at $18.55 per share on March 7, a 7% rise from March 6 on volume that was 130% higher.
Secure violated, and McNulty was a cause of Secure's violation of, Section 13(a) of the Exchange Act and Regulation FD.
www.sec.gov /litigation/admin/34-46895.htm   (1416 words)

 Secure Computing - Class Action Case C-99-1831 - Securities Class Action
Secure Computing and its insiders named as defendants herein who had knowledge of the true state of affairs of the Company's products, operations and financial condition had strong motives to inflate the price of the stock of Secure Computing.
Secure Computing's Plan/Budgets were very detailed presentations of the corporation's operations and included detailed discussion and analysis of the Company's operating results, planned or forecasted revenues, expenses, net income and earnings per share, and dividends for the fiscal year on an overall corporate basis.
Secure Computing was on track to report Q1 99 and 1999 EPS of $.09-$.13 and $.80-$.85, respectively.
securities.stanford.edu /1010/SCUR99/19990412_o11c_991831.htm   (6940 words)

 Secure Computing: Success stories
Inova chose Secure Computing's SmartFilter® based on several criteria, the most important of which were its wide platform support and its flexibility in allowing them to create their own custom lists.
Securing control of access to the Multiple Listing Service (MLS) is critical because it is no longer simply the listing information at risk; MLS systems have expanded to include contact management and CRM applications that store personal information about clients and prospects.
The District selected Secure Computing® based on the recommendation from their security consultant, and after conducting their own investigation as well, determined that Sidewinder G2 was the best firewall available.
www.searchopolis.com /index.cfm?skey=617   (7325 words)

 Welcome to Secure Computing | Norge | Sverige | Your Trusted Partner
Maintaining effective security is a continuous process that identifies assets, analyzes threats, and defines acceptable levels of risk.
Whether you are interested in a simple security audit or need to implement comprehensive security, privacy or trust measures, Secure Computing can step in and assist.
Secure Computing's clients are in a position to exploit cutting-edge benefits from the emerging business scenarios that employ new technologies such as e-commerce and wireless, safe in the knowledge that the business is protected against unforeseen risks and disasters.
www.securecomputing.no   (210 words)

 Secure Computing offers firewall appliance
Secure Computing Thursday introduced its first firewall appliance based on Sidewinder 5.2, previously sold only as software that had to be installed on a hardware platform by enterprise customers.
Secure Computing said the Sidewinder appliance can be ordered from Secure Computing or channel partners, but that the appliance will be built by Dell on the Dell PowerEdge Server.
Secure Computing said that although Dell's role is to customize Sidewinder as an appliance, Dell will not take purchase orders directly from customers.
www.networkworld.com /news/2002/0110seccomputing.html   (628 words)

 F-Secure: Home Computing   (Site not responding. Last check: 2007-10-21)
F-Secure Internet Security 2006 protects you not only against viruses and spyware, but also against hackers when you are connected to the Internet.
In addition, your computer cannot be misused for illegal operations.
What they may not realize is that some of the aforementioned may contain code or components that allow the developers of these applications and tools to actually collect and disseminate information about those using them.
www.f-secure.com /solutions/home.shtml   (311 words)

 Microsoft Next-Generation Secure Computing Base - Technical FAQ
Secure channels allow data to move safely from the keyboard/mouse to nexus-aware applications, and for data to move from nexus-aware applications to a region of the screen.
The nexus-aware security chip (the SSC) and other NGSCB features are not involved in the boot process of the operating system or in its decision to load an application that does not use the nexus.
The nexus and nexus computing agents are designed never to impose themselves on processes that do not request their services; nexus-related features must be explicitly requested by a program.
www.microsoft.com /technet/archive/security/news/ngscb.mspx   (5015 words)

 Secure Computing snags N2H2 | The Register
Secure Computing today announced plans to acquire content filtering company N2H2 in an all-stock transaction valued at approximately $19.9 million.
Secure Computing is probably best known for its Sidewinder G2 Firewall and VPN products, but it also has a smaller business selling content filtering technology.
Last week Secure Computing posted Q2 profits of $1 million on revenues of $18.2 million, compared to losses of $7.08 million on revenues of $16.6 million during the same period last year.
www.theregister.co.uk /2003/07/29/secure_computing_snags_n2h2   (344 words)

 Yishay Mor; Slightly informed, highly opinionated.
Secure Computing has sold no licenses to any entity in Iran, and any use of Secure's software by an ISP in Iran has been without Secure Computing's consent and is in violation of Secure Computing's End User License Agreement.
Secure Computing Corporation is fully committed to complying with the export laws, policies and regulations of the United States.
It is Secure Computing's policy that strict compliance with all laws and regulations concerning the export and re-export of our products and/or technical information is required.
ymor.blogspot.com /2005/06/allafricacom-tunisia-wsis-host-tunisia.html   (344 words)

 Residential Computing : Be Secure
Using the Be Secure CD or patch is like using a condom — it helps protect your computer from viruses and other threats that can cause problems for you and your machine.
If a computer is not compliant with these standards—which include having approved firewall and antivirus software, current security patches, and a strong password—it is not allowed to be connected to the Berkeley network.
The Be Secure CD is designed by Residential Computing’s network security department to easily help you meet these minimum security standards.
www.rescomp.berkeley.edu /besecure   (779 words)

 Secure Computing: Stanford Security Self-Help
Stanford Security Self-Help - based on the earlier Security Self-Test - is a simple, self-contained tool that performs a set of basic security checks appropriate to the kind of computer you run it on, and that permits you to make configuration changes.
The tool is non-intrusive, sends absolutely no information about your computer over the network, and is provided as an educational aid in your efforts to keep your computer more secure.
If the tool discovers any significant security vulnerabilities on your computer, it will alert you to this fact, and tell you how to address the problem, in many cases offering to do the repair itself.
www.stanford.edu /group/security/securecomputing/tools   (404 words)

 Secure Computing snaffles Cyberguard | The Register
Secure Computing has announced plans to acquire rival security firm CyberGuard in a cash and stock transaction valued at approximately $295m.
Now Secure Computing has become the suitor in a deal that marks further consolidation in the fast-moving information security marketplace.
Secure Computing's plans to expand its presence in the market are being partially financed by a $70m investment from private equity investor Warburg Pincus in the form of convertible preferred stock with warrants.
www.theregister.co.uk /2005/08/19/secure_snags_cyberguard   (339 words)

 Secure Computing
There are a number of basic steps that every computer user can and should take to make their computers safer.
Information security information specifically oriented toward people who are responsible for managing, supporting, or maintaining desktop systems (usually for others), server devices, or the networks to which they are connected.
Important security information for those who have management or oversight responsibility for information systems but are not providing "hands on" support themselves.
securecomputing.stanford.edu   (303 words)

 Secure Computing snaps up CyberGuard - ZDNet UK News
Secure Computing announced on Thursday that it was paying $295m (£165m) for CyberGuard.
Secure Computing claimed that the acquisition would give it more clout in the unified threat management and secure content management space.
Security Update gives you comprehensive business intelligence about a variety of security issues delivered straight to your inbox.
news.zdnet.co.uk /internet/security/0,39020375,39214231,00.htm   (298 words)

 Security News and Security Product Reviews - SC Magazine US
SC Magazine is delighted to invite senior IT Security professionals to apply for a free delegate place to attend the sixth SC Forum happening in May 2006.
The forum is an event that allows you, a delegate, the chance to listen to figures in the infosec industry, network with your peers, and meet one-on-one with vendors to assess your infosec needs.
SC Magazine Newswire delivers mission critical IT Security news of the past couple of days plus feature articles that no CSO can afford to be without.
www.scmagazine.com /us   (398 words)

 Microsoft Shared Source Initiative Home Page
Microsoft's Next-Generation Secure Computing Base (NGSCB)-another way Microsoft is building a trustworthy computing environment to help customers realize their full potential.
Our original approach was to create a new secure computing base that would run parallel to the regular Windows environment.
Secure Startup utilizes a Trusted Platform Module (TPM 1.2) to improve PC security and it meets some of the most critical requirements we heard from our customers-specifically, the capability to ensure that the PC running Longhorn starts in a known-good state, as well as protection of data from unauthorized access through full volume encryption.
www.microsoft.com /resources/ngscb/default.mspx   (402 words)

 Linux: Secure Computing API   (Site not responding. Last check: 2007-10-21)
Andrea Arcangli [interview] released an updated version of his secure computing patch [story] for the 2.6 Linux kernel [forum].
His own interests in the seccomp patch is for his cpushare project which aims to offer the ability to buy and sell spare cpu cycles over the internet.
I plan to eventually go a bit more complex (and in turn a bit less secure from the point of view of the seller) with xen-like trusted computing later once there will be enough hardware in the market to make it worthwhile.
kerneltrap.org /node/view/4005   (1728 words)

 InformationWeek | Censorship, Internet | Secure Computing Tries to Block Illegal Downloads in Iran | October 14, 2005   (Site not responding. Last check: 2007-10-21)
Oct 14, 2005 03:54 PM Secure Computing said Friday that it is taking steps to prevent Iran from illegally downloading its software.
In a report released earlier this year, ONI stated that Iran used software from Secure Computing, based in San Jose, Calif. to operate "one of the world's most substantial censorship regimes" in 2004 and 2005.
Secure Computing Public Relations Manager David Burt said Friday that the company is actively trying to stop Iran from using its software.
informationweek.com /story/showArticle.jhtml?articleID=172301283   (517 words)

 XcelleNet | Secure Mobile Computing
Putting applications and data onto mobile devices such as laptop computers and handheld devices is a good thing; many organizations have improved productivity by adopting mobile computing and by making their applications “always available”.
But as more employees take privileged data outside your organization’s secure environment, it is important to ensure that this improved productivity and convenience doesn’t come at the expense of security and data privacy.
Keeping confidential data secure has always been important, but new laws are making security concerns more important than ever; by recognizing the importance of maintaining customers’ data privacy they may expose companies with lax security to substantial financial penalties.
www.xcellenet.com /Form.aspx?FormID=54   (274 words)

 Boing Boing: ISPs in Iran, Tunisia also use SmartFilter (which blocks BoingBoing as "nudity")   (Site not responding. Last check: 2007-10-21)
In the comments thread on that post, former Secure Computing Public Relations Manager David Burt claims the copies of Smartfilter used by Iran's government-controlled ISPs were not licensed:
This page at the Secure Computing website allows you to check the fllist status of your favorite URLs, then provide recommendations to change their categorization.
Since Secure Computing is located in San Jose in the United States...
www.boingboing.net /2006/02/27/isps_in_iran_tunisia.html   (1047 words)

 CyberGuard Bids For Rival Secure Computing > CyberGuard Bids For Rival Secure Computing > July 12, 2004
Computer security-software provider CyberGuard Corp. launched a surprise bid for competitor Secure Computing over the weekend, offering to pay a 22 percent premium over the latter firm's closing stock price Friday.
Secure stumbled slightly in its latest quarter, as it missed its financials targets; CyberGuard appeared to be taking advantage of a drop in Secure's stock.
In reviewing Secure's performance last week, McNulty noted that his firm had missed its key governmental bookings by 40 percent in its second quarter, but he expressed confidence Secure would rebound.
www.techweb.com /wire/story/TWB20040712S0002   (469 words)

 Reference.com/Encyclopedia/Next-Generation Secure Computing Base
The "Next-Generation Secure Computing Base" (NGSCB), formerly known as Palladium (Pd), is Microsoft's new trusted computing architecture.
The stated aim is to fix the problems of current computer insecurity, and to create new kinds of distributed applications, where each component can know and trust the operation of other parts of the system, even when they are running on remote computers.
Simon Conant, a 'security expert' (quoted verbatim from the source article, the UK Metro) working for Microsoft said "We need to go back to the drawing board with a brand new architecture for the PC".
www.reference.com /browse/wiki/Palladium_operating_system   (1176 words)

 Linux: Secure Computing For 2.6   (Site not responding. Last check: 2007-10-21)
Andrea Arcangeli [interview] presented a "secure computing" patch for the 2.6.7 stable Linux kernel, asking people to review it and to look for holes.
Evidently referring to the as-of-yet veiled CPUShare, Andrea explains, "I need this new kernel feature for a spare time research project I'm developing [on] the weekends," which at first glance looks to be a cooperative clustering solution.
Actually from what I understand this code could be actually be used to make activeX-like technology secure (provided it is run out-of-process, but that is preferable anyway as bad plugins should not be able to crash a container) for use as web plugins.
kerneltrap.org /node/view/3413   (1777 words)

 Technorati Tag: secure   (Site not responding. Last check: 2007-10-21)
Secure HTTP AlterHosting knows it pays to care about security.
Secure Denture Bonding Cream - Save 30% Secure from Dentek is he only denture adhesive that will not dissolve in water and will not wash out.
Secure Free patent-pending Trust Gauge, the browser tool that graphically shows the trustworthiness and traffic ranking of any site appearing in your browser window whenever you are on the Web.
www.technorati.com /tag/secure   (605 words)

 Secure Computing buys CyberGuard   (Site not responding. Last check: 2007-10-21)
Secure Computing Corp. will purchase CyberGuard Corp. for about $295 million by the end of the year, Secure Computing officials announced.
The acquisition will make Secure Computing the powerful player, based on total revenues, in the area of unified threat management, said Steve Miller, the company’s vice president for worldwide marketing.
They are awaiting final approval from the Securities and Exchange Commission and hope to close the deal by mid-November, he said.
www.fcw.com /article90305-08-23-05-Web   (420 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.