Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Jan 2010

    A Secure Relay-Assisted Handover Protocol for Proxy Mobile IPv6 in 3GPP LTE Networks

    The LTE (Long Term Evolution) technologies defined by 3GPP is the last step toward the 4th Generation (4G) of radio technologies designed to increase the capacity and speed of mobile telephone networks. Mobility management for supporting seamless handover is the key issue for the next generation wireless communication networks. The...

    Provided By National Taiwan University

  • White Papers // Jan 2010

    SocialVPN: Enabling Wide-Area Collaboration With Integrated Social and Overlay Networks

    Trusted collaborative systems require peers to be able to communicate over private, authenticated end-to-end channels. Network-layer approaches such as Virtual Private Networks (VPNs) exist, but require considerable setup and management which hinder the establishment of ad-hoc collaborative environments: trust needs to be established, cryptographic keys need to be exchanged, and...

    Provided By Reed Elsevier

  • White Papers // Jan 2010

    An Efficient User Authentication and Key Exchange Protocol for Mobile Client - Server Environment

    Considering the low-power computing capability of mobile devices, the security scheme design is a nontrivial challenge. The IDentity (ID)-based public-key system with bilinear pairings defined on elliptic curves offers a flexible approach to achieve simplifying the certificate management. In the past, many user authentication schemes with bilinear pairings have been...

    Provided By Reed Elsevier

  • White Papers // Jan 2010

    Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

    Unsolicited Bulk E-mail (UBE) or spam constitutes a significant fraction of all e-mail connection attempts and routinely frustrates users, consumes resources, and serves as an infection vector for malicious software. In an effort to scalably and effectively reduce the impact of these e-mails, e-mail system designers have increasingly turned to...

    Provided By University of Miami School of Business Administration

  • White Papers // Jan 2010

    Enterprise Risk Management: Developing A Model For Organizational Success

    Enterprise Risk Management (ERM) was an unfamiliar concept. Today, the issue is quickly ascending the agendas of senior executives and shareholders alike, as corporate scandals and globalization challenge the status quo; and regulators publish new and updated requirements. Enterprise Risk Management is a structured approach to aligning strategy, processes, people,...

    Provided By Accume Partners

  • White Papers // Jan 2010

    Supervised Grid-of-Tries: A Novel Framework for Classifier Management

    Packet classification is the problem of identifying which one of a set of rules maintained in a database is best matched by an incoming packet at a router and taking the action specified by the rule. This is a uniform enabler for many new network services like firewalls, quality of...

    Provided By Springer Healthcare

  • White Papers // Jan 2010

    Comprehensive Security Framework for Global Threats Analysis

    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to...

    Provided By International Journal of Computer Science Issues

  • White Papers // Jan 2010

    Towards Automated Security Policy Enforcement in Multi-Tenant Virtual Data Centers

    Virtual data centers allow the hosting of virtualized infrastructures (networks, storage, machines) that belong to several customers on the same physical infrastructure. Virtualization theoretically provides the capability for sharing the infrastructure among different customers. In reality, however, this is rarely (if ever) done because of security concerns. A major challenge...

    Provided By IOS Press

  • White Papers // Jan 2010

    Botnet Judo: Fighting Spam With Itself

    The authors have traditionally viewed spam from the receiver's point of view: mail servers assaulted by a barrage of spam from which they must pick out a handful of legitimate messages. In this paper they describe a system for better filtering spam by exploiting the vantage point of the spammer....

    Provided By University of California, San Diego

  • White Papers // Jan 2010

    An Efficient Protocol for Resource Constrained Platforms Using ECC

    At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography,...

    Provided By Engg Journals Publications

  • White Papers // Jan 2010

    The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition

    The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerged in the 1980s. During the 1990s, the number of hash function designs grew very quickly, but for many of these proposals security flaws were identified. MD5 and SHA-1 were deployed in an ever increasing...

    Provided By Katholieke Universiteit Leuven

  • White Papers // Jan 2010

    Reaching New Customers With E-Mail Newsletters

    E-mail has become a business tool that is almost as important as the telephone because it overcomes many of the communications problems of other media. It's faster to communicate with someone via e-mail than with voicemail or fax. It doesn't require the recipient to take any unusual action to receive...

    Provided By Coravue

  • White Papers // Jan 2010

    Return on Information Security Investment - The Viability of an Anti-Spam Solution in a Wireless Environment

    Much is said about the importance of investing in information security, but little is known on the ex-tent and effectiveness of such security programmes. A model that analyses the mechanics of an information security programme is presented. The model attempts to put an upper-bound on the information security expenditure. The...

    Provided By University of Malta

  • White Papers // Jan 2010

    DDoS Incidents and Their Impact: A Review

    The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. Now they are being progressively replaced by cheaper and more efficient Internet-based applications. In present era, the world is highly dependent on the Internet and it...

    Provided By Guru Nanak Dev University

  • White Papers // Jan 2010

    Cyber Security Predictions for the Next Decade

    The first decade of this century has been a significant period for cyber security. As the authors look back at the last ten years - which started with attacks at the network layer with major worms like Nimda and SQL Slammer, and fast forward to application level attacks in the...

    Provided By Cenzic

  • Case Studies // Jan 2010

    Astaro Keeps South Montgomery Schools Informed

    The South Montgomery Community School Corporation's mission is to provide an educational program and learning environment which will empower students to become life-long learners with the knowledge, skills and attitudes to be successful, responsible, productive members of society. The school was using Novell's BorderManager with SurfControl for their content filtering...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Educates Kewanee Community School District on Network Behaviour

    The Kewanee Community School District #229 is a Kindergarten through twelfth grade school district. The district's mission is to educate the youth in Kewanee to be the best that they can be. The challenge was to implement a standalone appliance that could fulfill all security requirements and continue to grow...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Security Gateway Passes "Real-World" IPS Test

    Logansport Savings Bank puts Astaro's IPS system to the test to determine if it effectively blocks attacks. The challenge was to test the effectively of Astaro against a competing product in a real-world environment. Both products were simultaneously tested as a first and second line of defense respectively. As expected,...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Is Logical Choice for Mid-America Overseas Inc.

    Global transportation and logistics provider replaces Cisco Pix with Astaro and improves IT administration time by 75%. The challenge was to replace the Cisco PIX and Microsoft proxy server applications with an easy to administer network security solution. An Astaro Security Gateway 120 or 220 was deployed at each branch,...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Is a No Brainer for NeuroScience Consultants

    NeuroScience Consultants is a multi-location group of over 30 doctors spread out over 16 locations and with a central administrative office to handle the billing needs of the practices. Until recently each location had its own private network routed over the Internet using Multiprotocol Label Switching (MPLS) with Cisco Routers....

    Provided By Astaro

  • Case Studies // Jan 2010

    eEye Digital Security Watches Security With Astaro

    Employees at eEye Digital Security were receiving too much spam emails. The company began its search for a single solution that would solve his web, mail and network security issues. The challenge was to reduce the amount of spam messages and phishing attacks and control employee web access. Astaro Security...

    Provided By Astaro

  • Case Studies // Jan 2010

    Radiology Inc. Nukes Cisco Pix

    Radiology Inc. had outgrown their Cisco Pix firewalls. The challenge was to find a solution to replace their outgrown their Cisco Pix firewall. Two Astaro Security Gateway 220s in an active/active environment handle the business office network and email/web filtering. Astaro Security Gateway handles two times the throughput without any...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Receives an "A" at Fowlerville Community School

    Fowlerville Community Schools, a K-12 institution, has all of the regular security needs of an educational institution. The challenge was to replace the active content filtering system in order to provide students with sufficient web access control. After reviewing Cisco and Fortinet, Astaro Security Gateway won out due to its...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Security Gateway Keeps Kauffman's Network Rolling

    Kauffman Tire was operating without a spam filter, causing their associates' inboxes to be flooded with spam. The challenge was to seek out a modern firewall package and a reliable and effective spam filter. Astaro Security Gateway 320 was added as a firewall, to combat spam and enabled VPN access....

    Provided By Astaro

  • Case Studies // Jan 2010

    Hannoush Finds Jewel in Astaro

    Hannoush Jewelers's VPN firewall could not accommodate all 70 of their locations. The challenge was to find a VPN firewall solution to cover all 70 retailer outlets. It deployed two Astaro Security Gateway 425s at the headquarter location, supported by the 110 model at each outlet. Each outlet now runs...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Outperforms Cisco at Devine Millimet

    The Cisco PIX firewall appliances at Devine Millimet, Attorneys at Law, needed replacement. The challenge was to replace the Cisco PIX firewall appliance with a unified and modern security solution. Astaro Security Gateway supplied the features necessary for effective protection, being more cost-effective than other solutions. The unified threat management...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Serves and Protects City of Lake Wales

    When Information Services Director, City of Lake Wales, Florida, took over its current position the city didn't possess any firewalls, intrusion protection or web filtering solutions. The challenge was to search out and implement a new security solution for the government network. Astaro Security Gateway proved easy-to-use and facilitated a...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Makes Cents at Union Bank

    Union Bank of Monticello, Arkansas was utilizing an IBM Proventia for their network security. The challenge was to replace the IBM Proventia with a low cost and easy-to-use security solution. An Astaro Security Gateway 220 was implemented at Union Bank, managed through an Astaro Command Center at the service provider's...

    Provided By Astaro

  • Case Studies // Jan 2010

    Frontier Nursing Service Gets Clean Bill of Health

    The Cisco PIX and Barracuda Spam Firewall at this family-centered healthcare organization couldn't provide the IT team with the management and reporting functionality they needed. The reporting capabilities of Cisco and Barracuda were inadequate and did not allow the IT department to properly assess network needs. A replacement was needed....

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Safeguards Students at Texas High School

    The Texas preparatory high school's SonicWall wasn't making the grade: it lacked the flexibility, granularity and feature-richness that the school needed. The challenge was to replace the SonicWall appliance, which could not offer the required flexibility and granularity in content filtering. Astaro Security Gateway was chosen because of its comprehensive...

    Provided By Astaro

  • Case Studies // Jan 2010

    Astaro Rescues Ailing SonicWall Network

    Clark and Daughtrey's IT department was apprehensive about their network security. The SonicWall firewalls at this multispecialty medical group "Just did a very poor job of keeping out the spyware and the viruses." Managing multiple point solutions also proved too much work for their small IT team. The search for...

    Provided By Astaro

  • Case Studies // Jan 2010

    BorderManager Bites the Dust

    The Novell NetWare platform deployed district-wide in the Howe Sound School District 48 (SD48), along with their corresponding Novell BorderManager firewalls, were reaching end of life. The challenge was to replace the Novell NetWare and BorderManager firewalls, which were reaching end of life. Astaro was chosen because of its security...

    Provided By Astaro

  • Case Studies // Jan 2010

    Trouble-Free Transport Business With Astaro Security Gateway 220

    In the European commercial vehicle industry, Munich-based MAN Group achieves sustainable transport efficiency in local and long-distance traffic. In order to secure the company's data traffic, MAN searched for a solution fulfilling the demands of modern IT communication. MAN Nutzfahrzeuge selected the Astaro Security Gateway 220 at the company's Unified...

    Provided By Astaro

  • Case Studies // Jan 2010

    Network Bandwidth Provider Finds a Two-Fold Solution in Astaro

    Georgia Public Web, Inc., an internet service provider selling fiber connectivity throughout the state, decided that their Cisco PIX firewall was just not cutting it. The challenge was to replace the Cisco PIX firewall with a solution which can be easily updated and can deal with large amounts of spam...

    Provided By Astaro

  • Case Studies // Jan 2010

    Case Study: FICO and the Agilis Orion Server

    FICO had been using a simple in-house license manager to protect new installations of the FICO score, but as new implementations quickly spread around the world, they decided they needed a more sophisticated system for managing the licenses they sold worldwide. A major challenge with the product installations was that...

    Provided By Agilis Software

  • Case Studies // Jan 2010

    Astaro Boosts Green County Agency's Security

    The Green County Board of Development Disabilities is a county agency committed to serving individuals with mental and physical disabilities in Green County, while providing support services for their families. The Greene County Board of Developmental Disabilities, an agency committed to serving individuals with mental and physical disabilities, had a...

    Provided By Astaro

  • Case Studies // Jan 2010

    Helix Design Develops a Secure Network With Astaro

    Helix Design is a product development consultancy. They develop products for industrial, consumer, medical and military applications. Helix Design was using WatchGuard's Firebox III appliance to secure their network, which had fallen out of date and failed to provide protection from many current threats. After conducting extensive research and viewing...

    Provided By Astaro

  • White Papers // Jan 2010

    C.R.M. Benefits For Midsize Businesses

    Customer relationship management (C.R.M.) applications can deliver significant value to today's midsize businesses. With a C.R.M. system in place, midsize companies can improve employee productivity, shorten sales cycles and increase revenues, minimize sales and support-related expenses, and build stronger and more profitable relationships with customers. There are currently many C.R.M....

    Provided By CompareCRM.com

  • White Papers // Jan 2010

    Planning Procedures For Building Effective Management Systems: Phase II

    Have you ever had the opportunity to watch the construction of a large building? The daily progress from foundation to top floor is truly amazing, you wonder "how does it all happen?" The answer: it takes a lot of planning. The Planning Phase: A complex construction job clearly requires planning...

    Provided By CompareCRM.com

  • White Papers // Jan 2010

    Clock and Data Recovery Circuit for 2.5Gb/s Burst-Mode Receiver

    This paper describes a 2.5Gb/s CDR for asynchronous burst-mode data transmission, such as ATM-PON. A CDR employing gated-oscillators was designed and simulated using AlGaAs/GaAs HBT. The gated-oscillator consumes 1.12 W of power with a single - 7 V supply, and the differential output voltage swing is 0.9 Vp-p into 50...

    Provided By Information and Communications University