Klinkby-Silver
nternet
of BindView the
summarized “Working
practices
are
becoming
increasingly
flexi-
ble
and
the
associated be
Companies
need
that policies
native
BIND 9 plugs DNS
risks
to
The hole in DNS,
ensure
cases
are communicat-
ed . . . and to be more
outside
of IT
from
significant
number
at least part
and
remotely.
revealed
that
can access
working
from
worked
at
often
support
within hours,
according
to 64%
of respon-
companies
adequately
the use of 12%
devices,
mobile respondents stolen
telephone
or lap-
or lost.
people
with
home
admitted
provide
48%
workstations using
at
them
12%
of
to
Solutions
advance-
for security.
However
ment”
are fears of
ing content mobile mobile
systems
used
are
or
is also
t smart-card :ommon
BIND
or just by
Another
barrier
small
a
are
more
more
al threats
like
viruses
they are about a
to be outit features
Consortium, www.isc.org. The
mtomated
security
clients
US
Information
3utlook,
Systems Agency, www.disa.mil,
windows
awarded them the $2 million
t will also work in most com-
Defense
Software
NAI
Labs,
also helped to
name,
Xinetica monitor modems has
their
product
large,
defined
been around
in
a
-
To make it work
the user’s DNS servDSN
makers
top-level
domain
servers
must
cation
tele-
which
has
describe
the
threat caused by modem
access
as that, “data can potentially
anywhere
both
reporting
into
be
and out
to any phone
in the world.”
It is sold
root
on the
for about 20 years.
of your company
and
as a management
Klinkby-Silver
commented
although
companies
that invest
time
securing
and
in
something until
the
network,
many
respond
to the
compatible.
risk of access
through
autho-
firmly
routes
individuals outside
-
either
inside
of the organization.”
or
Names (ICANN)
fir
more
information.
Cost-cutting Web server
aid.
Equinet
released
has
NetPilot,
an Internet
access
server which promises
in its
to save you money
hype
your corporate
on
usage, as well
as securing usage. NetPilot
is based
on a Linux
operating
system
and features
a simple
WAN
support
and
interface,
VPN
a user-friendly
audit trail. caching
to
Menace” which is available on
resources
in reloading
their website at www.xiscan.com.
ly accessed pages, and monitor-
This verifiusing
of BIND of
a moot
pri9 are point
Internet
at large
This
puts the ball
in
and
It works
in two ways: save
page
time
and
frequent-
ing pages accessed to discourage regarding
Corporation
by unauthorized
Cen/enterprise.asp
White Paper called “The Modem
worries uptake
www. ealaddin. com/eto-
See
be able to com-
securely.
to also
rized
the
money
vate
Enterprise undergoing
Xinetica have ako released a
is then confirmed
The
eToken
(TLD)
a digital signature.
risk.
to the eToken
tool, the war-
that domain.
the Internet’s
environments. is PKI ready and
to
entry
an automated dialler
The
and
a
in order
is based
hacking -
phone
than
website’s
Aladdin’s
scans
unauthorized
ancient
the DNS server
target
corporate
The solution
sets of tele-
transferred
er, the
and browsers:
JS. 1.1 is currently
to Xiscan,
which
checks the actual II’ address for
effectively,
login
for
Notes,
:heir E-mail messages.
launched
website dedicated
dialler
gener-
types
non
Lotus
Nil1 allow the user to download
points to the network.
spoofing.
user
to do with hardware.
in that
Internet
The product
many
about
avoids
If-the-box
yen-projt
find
adoption.
concerned
so
t is also intended
phone numbers
effort
is that
enterprises
When
It
in man-hours extra
and
Beta testing.
hardware
this
is basically
implementation
jroblems
compatibility.
is distributed
9
Kinetica
to the
system.
to slow
municate
to use com-
workstations
and
lead
server
of hir-
workers
visitors
by
hacker
The practice
temporary
allowing
by
even though
devices
magnets.
regard-
communicated
telephone
the gateway
“fail
the
stronger
to run may
called
related
Enterprise
ligital certificates
for
a “huge
:Token
If a spoofing
problem,
E-com-
md be able to sign and encrypt
from
DNSSEC
domain
companies
have any sort of policy
pany
of
access for others.
Only
ing
of
said that they had
had a mobile
OS
Network
requires
also fail to
control
IP
develop DNSSEC.
9, is avail-
into
and an increase
Some
an
networks,
nerce and with VPNs.
address does not match because
www.nai.com,
which
users
whether
Tontract.
digital
spokesperson
uptake
dents.
top
integrated
there
working
it, BIND
A
they only had access to
security
and
Sun, HP Red Hat and others.
unconventional
regular
names
The software
supports
be
those
home
by allowing
encryption
know
:orporate
DNSSEC.
happens,
able open source, and will soon
The report
although
to been
of domain
signatures. a
of the corporate
network
times,
regu-
home
has
works
verification using
larly work
IT
websites,
DNSSEC
and working
of professionals
hackers
DNSSEC.
hours.” 37%
by
this
ack of DNSSEC
in some
fLved by a new system called
of the work-
ing environment
used
spoof
imagi-
in the provision
support
won’t
ignored.
cannot
to support
Until
findings,
is
the
Internet
for
Assigned Numbers’
court to upgrade
the
staff from using the Internet
Plug-and-play eToken
non-work
The makers say it is, “a costeffective and highly secure method
Aladdin
has
eToken which factor
released features
authentication
is designed
for
related purposes.
an two-
which
for use within
of providing
E-mail
Web access for networked For
further
details
and PCs”. visit
www.equiinet.co. uk/products/ov er/ne+ot/detail.pbp_3