Check Point SandBlast takes endpoint protection to another level

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 17, 2016
Featured Image

Secret Service IT security lambasted by Homeland Security inspector general

Further from the report: “US Secret Service systems and data remain vulnerable to unauthorized access and disclosure. As discussed, contributing factors included inadequate system security plans, systems with expired authorities to operate, inadequate access and audit controls, noncompliance with logical access requirements, inadequate privacy protections, and over-retention of records. Such deficiencies increase risks to the confidentiality, integrity, and availability of mission- critical information systems and data.” Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Check Point SandBlast takes endpoint protection to another level
University IT employees fighting for jobs question security
Cisco patches critical authentication flaw in conferencing servers
Survey says many companies want to phase out passwords
US lawmakers want answers on Yahoo email surveillance
New products of the week 10.17.16

White Paper: NetSupport Inc

Adding Extra Security Without the Added Cost

NetSupport DNA is an ITAM suite− with a twist. It also includes a range of tools designed to work as part of an organisation's broader desktop and network security planning. Read More

Thumbnail Image
INSIDER

Check Point SandBlast takes endpoint protection to another level

Check Point has long been known as a firewall company but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line. Read More

Thumbnail Image

University IT employees fighting for jobs question security

The IT employees say workers in India will have access to University of California at San Francisco medical and financial information as well as to files with research and study data. Read More

Thumbnail Image

Cisco patches critical authentication flaw in conferencing servers

Cisco Systems has patched a critical vulnerability that could allow attackers to gain access to Cisco Meeting Server deployments, which are used in enterprise environments for video and audio conferencing. Read More

Thumbnail Image

Survey says many companies want to phase out passwords

Don't be surprised if your company decides to do away with password logins. A new survey has found that most organizations are leaning toward phasing out password authentication. Read More

Thumbnail Image

US lawmakers want answers on Yahoo email surveillance

A bipartisan group of 48 U.S. lawmakers wants two government agencies to explain a surveillance program in which Yahoo reportedly scanned all the messages of its email users on behalf of the FBI. Read More

Thumbnail Image

New products of the week 10.17.16

Our roundup of intriguing new products from companies such as Citrix and Talari Networks. Read More

White Paper: NetSupport Inc

Adding Extra Security Without the Added Cost

NetSupport DNA is an ITAM suite− with a twist. It also includes a range of tools designed to work as part of an organisation's broader desktop and network security planning. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 hidden features of Google office apps

Seattle substation is cool enough to draw a crowd Read More

Most-Read Stories

1. Winners and losers from the big AWS-VMware pact
2. elementary OS 0.4: Review and interview with the founder
3. President Obama targets nasty space weather response with Executive Order
4. 19 free cloud storage options
5. Linux command line tools you didn’t know you need
6. 7 free tools every network needs
7. 8 tech ‘megatrends’ that are about to change business
8. Google Graveyard: What Google has killed in 2016
9. The truth about cybersecurity certifications
10. Cisco fashions tactical ransomware defense
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.