IT security, vunerabilities, bugs, fixes, flaws, RSA conference and Infosec.
A blog from

« April 2010 | Main | June 2010 »

Astaro secures iPad connections

The business case for buying an iPad has grown even stronger with yet another enterprise software vendor launching products tailored for the much-hyped tablet device.

This time it was unified threat management vendor Astaro which yesterday announced its Security Gateway product now provides support for the device that allows business users to securely connect their iPad to the corporate network.

"The iPad has achieved massive sales numbers and shows strong consumer demand for this type of device, and businesses will have to face the issue of how employees can securely use it for business tasks while on the road," said Gert Hansen, vice president of product management at Astaro.

"Connecting to the network with the Astaro Security Gateway means employees can securely access their resources via the iPad. This feature is not reserved to Astaro customers as it is also included in the Essential Firewall edition that is free for business use."

The Astaro Security Gateway supports PPTP, L2TP and IPSec Virtual Private Network (VPN) connections, and removes the need to purchase new apps or networking equipment to work safely on the iPad, said the firm.

The news follows launches by Citrix, Zenprise and Rackspace all designed to make the iPad more attractive to the corporate user.

May 20, 2010 | | Comments (2)

McAfee reorganises business

Security giant McAfee has decided to reorganise its business units and products into four key areas in an attempt to unify and simplify its offerings and better support its customers.

As of yesterday, McAfee will offer products and services in four key areas: endpoint security, network security, content security, and risk and compliance.

Each unit's raft of products will still hook up to the ePolicy Orchestrator management platform or the firm's cloud-based system, and will still benefit from McAfee Labs' Global Threat Intelligence network, the firm said.

"Businesses are looking for solutions to business issues, not just point products," said Dave DeWalt, president and chief executive of McAfee.

"By aligning with these business issues, and providing a comprehensive approach that includes products, technology and delivery methods, we aim to provide the best customer experience in the industry."

Now, customers like consolidation. The trend in the security industry for some time now has been consolidation of vendors and products within vendors' portfolios, largely driven by customer demand.

It remains to be seen though whether this reogranisation by McAfee will be welcomed by customers. Security professionals are not big fans of change, and changes like this often lack substance on closer inspection.

May 13, 2010 | | Comments (0)

Labour shamed on cyber security

The majority of information security professionals are in the dark over the main political parties' policies on cyber security, according to a poll from data loss prevention and archiving firm Proofpoint.

The vendor asked 140 security professionals at the recent Infosecurity Europe show in London, which party they thought would do the most to improve cyber security in the UK.

Despite Labour's belated efforts to introduce a Cyber Security Operations Centre to GCHQ and create an Office of Cyber Security based in the Cabinet, it polled the worst out of the major parties with just seven per cent.

The Lib Dems fared little better with 11 per cent while the Tories just crept in to the lead with 12 per cent.

However, more telling was that 57 per cent said they didn't know, indicating that the major parties still have a long way to go to engage with and reassure the security community that they have a coherent cyber security strategy.

The argument could in fact be extended to technology in general. As our recent round up series on the main political parties' tech manifestos shows, they leave the reader with more questions than answers.

There are many aspirations in the manifestos, from all the major parties, but when questioned on specifics they go a little quiet. In fact, when pushed them just a little on certain issues we were sometimes met with a rather terse response from their press officers.

Take from this what you will, but it would seem that technology and information security are still a pretty long way down the policy agenda pecking order.

May 5, 2010 | | Comments (0)

Site credentials: About | Privacy policy | Terms & conditions | Top of the page
© Incisive Media Investments Limited 2010, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093