Xinetica monitor modems

Xinetica monitor modems

Klinkby-Silver nternet of BindView the summarized “Working practices are becoming increasingly flexi- ble and the associated be Companies...

149KB Sizes 1 Downloads 89 Views

Klinkby-Silver

nternet

of BindView the

summarized “Working

practices

are

becoming

increasingly

flexi-

ble

and

the

associated be

Companies

need

that policies

native

BIND 9 plugs DNS

risks

to

The hole in DNS,

ensure

cases

are communicat-

ed . . . and to be more

outside

of IT

from

significant

number

at least part

and

remotely.

revealed

that

can access

working

from

worked

at

often

support

within hours,

according

to 64%

of respon-

companies

adequately

the use of 12%

devices,

mobile respondents stolen

telephone

or lap-

or lost.

people

with

home

admitted

provide

48%

workstations using

at

them

12%

of

to

Solutions

advance-

for security.

However

ment”

are fears of

ing content mobile mobile

systems

used

are

or

is also

t smart-card :ommon

BIND

or just by

Another

barrier

small

a

are

more

more

al threats

like

viruses

they are about a

to be outit features

Consortium, www.isc.org. The

mtomated

security

clients

US

Information

3utlook,

Systems Agency, www.disa.mil,

windows

awarded them the $2 million

t will also work in most com-

Defense

Software

NAI

Labs,

also helped to

name,

Xinetica monitor modems has

their

product

large,

defined

been around

in

a

-

To make it work

the user’s DNS servDSN

makers

top-level

domain

servers

must

cation

tele-

which

has

describe

the

threat caused by modem

access

as that, “data can potentially

anywhere

both

reporting

into

be

and out

to any phone

in the world.”

It is sold

root

on the

for about 20 years.

of your company

and

as a management

Klinkby-Silver

commented

although

companies

that invest

time

securing

and

in

something until

the

network,

many

respond

to the

compatible.

risk of access

through

autho-

firmly

routes

individuals outside

-

either

inside

of the organization.”

or

Names (ICANN)

fir

more

information.

Cost-cutting Web server

aid.

Equinet

released

has

NetPilot,

an Internet

access

server which promises

in its

to save you money

hype

your corporate

on

usage, as well

as securing usage. NetPilot

is based

on a Linux

operating

system

and features

a simple

WAN

support

and

interface,

VPN

a user-friendly

audit trail. caching

to

Menace” which is available on

resources

in reloading

their website at www.xiscan.com.

ly accessed pages, and monitor-

This verifiusing

of BIND of

a moot

pri9 are point

Internet

at large

This

puts the ball

in

and

It works

in two ways: save

page

time

and

frequent-

ing pages accessed to discourage regarding

Corporation

by unauthorized

Cen/enterprise.asp

White Paper called “The Modem

worries uptake

www. ealaddin. com/eto-

See

be able to com-

securely.

to also

rized

the

money

vate

Enterprise undergoing

Xinetica have ako released a

is then confirmed

The

eToken

(TLD)

a digital signature.

risk.

to the eToken

tool, the war-

that domain.

the Internet’s

environments. is PKI ready and

to

entry

an automated dialler

The

and

a

in order

is based

hacking -

phone

than

website’s

Aladdin’s

scans

unauthorized

ancient

the DNS server

target

corporate

The solution

sets of tele-

transferred

er, the

and browsers:

JS. 1.1 is currently

to Xiscan,

which

checks the actual II’ address for

effectively,

login

for

Notes,

:heir E-mail messages.

launched

website dedicated

dialler

gener-

types

non

Lotus

Nil1 allow the user to download

points to the network.

spoofing.

user

to do with hardware.

in that

Internet

The product

many

about

avoids

If-the-box

yen-projt

find

adoption.

concerned

so

t is also intended

phone numbers

effort

is that

enterprises

When

It

in man-hours extra

and

Beta testing.

hardware

this

is basically

implementation

jroblems

compatibility.

is distributed

9

Kinetica

to the

system.

to slow

municate

to use com-

workstations

and

lead

server

of hir-

workers

visitors

by

hacker

The practice

temporary

allowing

by

even though

devices

magnets.

regard-

communicated

telephone

the gateway

“fail

the

stronger

to run may

called

related

Enterprise

ligital certificates

for

a “huge

:Token

If a spoofing

problem,

E-com-

md be able to sign and encrypt

from

DNSSEC

domain

companies

have any sort of policy

pany

of

access for others.

Only

ing

of

said that they had

had a mobile

OS

Network

requires

also fail to

control

IP

develop DNSSEC.

9, is avail-

into

and an increase

Some

an

networks,

nerce and with VPNs.

address does not match because

www.nai.com,

which

users

whether

Tontract.

digital

spokesperson

uptake

dents.

top

integrated

there

working

it, BIND

A

they only had access to

security

and

Sun, HP Red Hat and others.

unconventional

regular

names

The software

supports

be

those

home

by allowing

encryption

know

:orporate

DNSSEC.

happens,

able open source, and will soon

The report

although

to been

of domain

signatures. a

of the corporate

network

times,

regu-

home

has

works

verification using

larly work

IT

websites,

DNSSEC

and working

of professionals

hackers

DNSSEC.

hours.” 37%

by

this

ack of DNSSEC

in some

fLved by a new system called

of the work-

ing environment

used

spoof

imagi-

in the provision

support

won’t

ignored.

cannot

to support

Until

findings,

is

the

Internet

for

Assigned Numbers’

court to upgrade

the

staff from using the Internet

Plug-and-play eToken

non-work

The makers say it is, “a costeffective and highly secure method

Aladdin

has

eToken which factor

released features

authentication

is designed

for

related purposes.

an two-

which

for use within

of providing

E-mail

Web access for networked For

further

details

and PCs”. visit

www.equiinet.co. uk/products/ov er/ne+ot/detail.pbp_3