VPN encouraged in Europe

VPN encouraged in Europe

October 7998 Network Security export licensing arrangement to a list of 42 countries. Also announced is the ability to export strong encryption of ...

133KB Sizes 2 Downloads 95 Views

October

7998

Network Security

export licensing arrangement to a list of 42 countries. Also announced is the ability to export strong encryption of any bit length, with or without key recovery features, to subsidiaries of US companies to all destinations in the world with the exception of the seven terrorist nations.

Hit squad put on trail of hackers Victims of cyber crime on the Internet can hire CI set of specialists to track the criminals, CenturyCorn has launched the UK’s first detective service to trace computer-based criminals back to their point of entry and beyond. Once these gaps in the security are located they can be secured against future attack. As soon as a company or individual is aware of a breach of they can call security, CenturyCorn’s Hacker Hotline for assistance. The squad use various techniques, such as examining the type of attack and event logs, where they occurred in an attempt to track the crime back from the network or Web server, Although most hackers cover their tracks by hacking into unrelated PCs and launching their attacks from there, the majority of their routes remain undetectable. This means that, while few cyber-criminals leave themselves open to capture, their entry points can be located and blocked to prevent future attacks,

VPN encouraged in Europe Point Software Check Technotogies Ltd has announced

0 1998 Elsevier

Science

Ltd

that its technology is at the heart of a global managed VPN service, which includes most of the major business centres in Europe. Concert VPDN (virtual private data network) from Concert will provide customers with a secure communications channel without the need for additional management personnel or equipment. Check Point Firewall-l is integrated into Concert VPDN and the company provides critical a interoperability through the advantage Open Platform for Secure Enterprise Connectivity (OPSEC) architecture. VPN-1 SecuRemote Check Point’s client encryption software application - is an integral component of Concert VPDN, as both the mean by which Concert manages client services from its secure network operations centre in Amsterdam, and also as the provider of flexible VPN support for Concert Remote Access Service, Concert’s managed dial-up service for remote and mobile users. OPSEC is a single platform that integrates and manages all aspects of network security through an open, extensible management framework. This allows customers to choose the system components that best meet their requirements, and to exploit the latest developments in security technology. For further information, con tact Steve Barnett, Check Point Software Technologies on: +44 1223 236 857; E-mail: steveb Qcheckpointxom.

Company acquisition to provide network protection Internet Security Systems (ISS) is acquiring privately held March Information Systems, a UK-based developer of Windows NT and Unix-based security assessment technologies. The combined offerings of both companies will extend the value and capabilities of ISS’s SAFEsuite adaptive network security solutions for protecting networks and systems across entire enterprises. March Information Systems‘ security assessment products complement ISS’s software portfolio, including security vulnerability and intrusion detection systems and enterprise security decision-support technology. The company hopes to be able to offer its customers advanced security control for proactively monitoring and detecting security vulnerabilities and threats within dynamic enterprise network environments, ISS intends to extend its range of security offerings with robust capabilities in two new areas: user end activity assessment and increased platform support. As unacceptable and acceptable security risks become more defined through security policy development, they must be managed across the entire spectrum of business activities from base network services to applications, and from Web servers to the individual desktops of end users.

3