Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection — Kaspersky PURE 2.0 Total Security. Using Kaspersky Lab’s award-winning anti-malware protection and an array of additional security tools, Kaspersky PURE 2.0 Total Security is the easiest way to keep multiple PCs secure, irreplaceable digital assets protected, and children safe and responsible online.
Central Home PC Management
Ideal for households with multiple computers, including families with children, Kaspersky PURE uses Home Network Management to easily protect, manage and monitor every PC in the household from a single machine.
— Run all scans, updates, and backup tasks on every PC in the house automatically or on-demand
— Fix security issues without getting up from your desk
— Manage parental controls from anywhere in the house, so your kids are protected even when they’re out of view
— Conveniently update the Kaspersky PURE licenses throughout your home
Total Package of Security Tools
Kaspersky PURE also includes everything you need to secure your online identity and protect your irreplaceable digital property. When you install Kaspersky PURE, our extra layers of security mean you can say good-bye to overpriced and inefficient niche products.
This is great work. I am demoing the product now and will post my review shortly. Very excited about how this will shape the home and small business central management landscape. Will vendors pile on?
More on this breaking news can be found here: http://www.marketwatch.com/story/kaspersky-lab-announces-new-generation-of-ultimate-pc-protection-for-your-home-2012-03-26
Intelligent network security and data protection solutions provider, SonicWall, has expanded its suite of firewall security services with the addition of Kaspersky Anti-Virus to its Enforced Client Anti-Virus and Anti-Spyware solution.
SonicWall Firewalls are designed to ensure easy deployment, provisioning and enforcement of the client on endpoint devices through a unique policy-driven engine.
SonicWall Next-Generation and Unified Threat Management firewalls already provide gateway anti-virus through SonicWall’s proprietary reassembly-free deep packet inspection anti-malware solution, protecting the perimeter, wireless and VPNs. But, according to SonicWall, viruses can still enter the network through laptops, thumb drives or other unprotected systems. Protection at multiple layers is the best defence against sophisticated modern threats, however, maintaining, enforcing and deploying the right security software on endpoint devices can put a strain on IT resources and budgets. SonicWall firewalls are designed to provide an innovative multi-layered anti-malware strategy consisting of its anti-malware solution at the gateway and enforced anti-virus solution at the endpoints.
When a non-compliant end-point within the network tries to connect to the internet, the firewall will redirect the user to a web page to install the latest SonicWall Enforced Client Anti-Virus and Anti-Spyware software. The firewall is also designed to ensure that all the end-point clients are automatically updated with the latest anti-virus and anti-spyware signatures without end-user intervention. The updated clients can remediate infections by cleansing the endpoint systems and thus preventing further propagation of the threat throughout the network. SonicWall has integrated Kaspersky technology into its enforced client solution. The software resides on endpoint computers and delivers critical protection against viruses, spyware, Trojans, worms, rootkits and more. “Deploying, maintaining and enforcing the right security software on endpoint devices within a network can be difficult,” said Swarup Selvaraman, product line manager at SonicWall. “Our innovative SonicWall solution simplifies this process and gives IT managers’ easy-to-deploy anti-virus and anti-spyware protection across any number of devices using policy-based management and reporting. Kaspersky support bolsters our existing offering and gives customers more opportunities to choose the anti-virus solution that best meets their needs.” The solution is designed to support Microsoft Windows PCs and laptops and is ideal for deployments scaling from a few to thousands of end-points.
Aruba Delivers BYOD Control with ClearPass
The bring-your-own-device (BYOD) era is booming, while BYOD delivers some freedom to users and is great don’t get me wrong, however. It is still absolutely critical that companies reachthe same degree of protection, and control that corporate owned devices also receive to these devices. It has to be thought of as a wired device, in my opinion.
“ClearPass provides a networking solution for BYOD to address all of the majoroperating systems and any networking vendor’s network architecture,” Robert Fenstermacher, director of Product Marketing at Aruba, told InternetNews.com. “It can act as a single point of policy control across all wired, wireless and remote infrastructure for a global organization.”
- Aruba simplifies IT management of BYOD (infoworld.com)
- Aruba to buy Avenda for BYOD security (infoworld.com)
- Aruba Simplifies IT Management of Employee-Owned Mobile Devices (oracleidentity.wordpress.com)
In a recent article posted on Network World, Qualys; a security firm specializing in vulnerability scanning and assessment says they are ready to go public. Based on my experience with the product I would have to agree that this would be a good decision. Regarding the fact that I have used, and currently using Qualys on a contract position, many hours have been spent using and abusing these appliance(s). I have witnessed first hand the ways the scanning engines have morphed into a dependable tool with low false positives. Offering more asset control to the administrator than in recent years, and the overall performance issues that have been handled through it’s generations have made this product ready for prime time. Apparently I am not the only one who thinks so – with over 5,000 appliances currently running on production environments world wide.
“Courtot says the company did about $76 million in revenue last year, showing profitability, and expects to see revenues grow to $94 million this year,” Messmer writes. “Its variety of products, and scanning and compliance services, have become widely used by about 5,000 organizations around the world.”
For the full story click here: http://www.networkworld.com/news/2012/022112-qualys-ipo-256396.html
- The 8 Best Tips You’ll Ever Get On How To Launch (And Grow) A Startup (businessinsider.com)
Assessing Your Wireless Network Security
Wireless network penetration testing—using tools and processes to scan the network environment for vulnerabilities—helps refine an enterprise’s security policy, identify vulnerabilities, and ensure that the security implementation actually provides the protection that the enterprise requires and expects. Regularly performing penetration tests helps enterprises uncover WLAN network security weaknesses that can lead to data or equipment being compromised or
destroyed by exploits (attacks on a network, usually by “exploiting” a vulnerability of the system),Trojans (viruses), denial of service attacks, and other intrusions.
Here is a great article I was reading on Cisco blogs and found it useful to post. Enjoy!
Sampa Choudhuri – Network security is a never-ending task; it requires ongoing vigilance. Securing your wireless network can be particularly tricky because unauthorized users can quietly sneak onto your network, unseen and possibly undetected. To keep your WLAN secure, it’s important to stay on top of new wireless vulnerabilities. By regularly performing a vulnerability assessment on your wireless network, you can identify and close any security holes before a hacker can slip through them.
With a WLAN vulnerability assessment, you’re figuring out what your wireless network looks like to the outside world on the Internet. Is there an easy way in to your network? Can unauthorized devices attach themselves to your network? A WLAN vulnerability assessment can answer these questions—and more.
1. Discover wireless devices on your network. You need to know everything about each wireless device that accesses your network, including wireless routers and wireless access points(WAPs) as well as laptops and other mobile devices. The scanner will look for active traffic in both the 2.4GHz and 5GHz bands of your 802.11n wireless network. Then, document all the data you collect from the scanner about the wireless devices on your network, including each device’s location and owner.
2. Hunt down rogue devices. Rogue devices are wireless devices, such as an access point, that should not be on your network. They should be considered dangerous to your network security and dealt with right away. Take your list of devices from the previous step and compare it to your known inventory of devices. Any equipment you don’t recognize should be blocked from network access immediately. Use the vulnerability scanner to also check for activity on any wireless bands or channels you don’t usually use.
Read the 5 Steps here:
- Biggest Wireless Threat….. The Admins? (netsecurityit.wordpress.com)