Firewall: Reports of its death have been greatly exaggerated
At the ripe old age of twenty, the humble firewall might be considered past its prime by some, but despite the many declarations from various experts that the perimeter is no more, that we live in an...
View ArticleSecurity Readers' Choice Awards
Over on TechTarget, readers voted on the best web application firewall products of 2014, and the winners seem to be especially strong in the area of centralized management features. The post Security...
View ArticleMicrosoft rebranding Identity Manager with new preview
Once upon a time, Microsoft had an exciting slate of products that included TMG, UAG, Identity Manager, Protection for Exchange and SharePoint, and more. Now many of the products have been discontinued...
View ArticleForefront TMG 2010 SQL Services Fail to Start after Disabling SSL 3.0
The POODLE attack (Padding Oracle on Downgraded Legacy Encryption) is a man-in-the-middle type of attack that exploits vulnerabilities in SSL 3.0. The mitigation for this is to disable SSL 3.0, which...
View ArticleReverse Proxy for Lync
Lync requires reverse proxy services to enable some Lync user experiences, such as allowing external users to download meeting content and files from the Address Book service, access the Lync Web App...
View ArticleCelestix rides to the rescue of TMG/UAG users
Celestix Networks has been a major provider of ISA and then TMG appliances, and other secure remote connectivity solutions. Now they've decided to pick up where Microsoft is leaving off and provide...
View Article2015 State of IT Changes Survey
Just answer several simple questions and get the opportunity to win one of the five $30 Gift Cards on Amazon. The survey is open till February 28, and the names of the lucky winners will be chosen at...
View ArticleLast chance to sign up for the webinar: Preventing High Cost Security Breaches
Brien will also discuss likely future trends based on recent data breach investigations and address a range of important topics including: How and why do data breaches happen and which firms are most...
View ArticleThe KEMP Free LoadMaster
Today KEMP Technologies is launching FreeLoadBalancer.com, where a free version of their popular LoadMaster™ will be available for download and unlimited use. This will make it easy for IT developers...
View ArticleLast Chance to Sign up for the Webinar Windows 2003 End of Life Risks and...
Join us for a live webinar to learn the important “need-to-knows” for existing Windows 2003 customers from Microsoft MVP Richard Hicks on Wednesday, August 19th, 2015 at 1PM EDT | 12N CDT | 10AM PDT....
View Article
More Pages to Explore .....