McAfee just announced they will be selling off their firewall business to Raytheon / Websense. The original post from crn can be found HERE.
As part of the company’s new strategic direction, Intel Security has signed its intention to sell its McAfee Next-Generation Firewall and McAfee Firewall Enterprise businesses to Raytheon|Websense, CRN has learned.
The intent to acquire the division, which was revealed in a memo to Raytheon|Websense employees Monday that was viewed by CRN, is the first big acquisition move made by the combined company. Raytheon acquired Websense in June for $1.9 billion. Continue reading →
Today’s threat landscape is loaded with malicious websites, malware and other risks that attack users every nanosecond of the day. There isn’t a single product available that can guarantee protection from cyber threats. Older solutions leveraging static technologies such as signatures are not good enough. The best approach for dealing with advanced threats is continuously monitoring the entire network through layering security technologies. Continue reading →
Its shocking how organizations are compromised due to administration carelessness such as using default passwords or advertising sensitive information on public sources. Many companies purchase top dollar security solutions however fail at addressing the most common security weakness; enforcing thorough security policies. One popular reconnaissance technic known as Google Hacking (however can use other search engines) can expose confidential information, vulnerabilities and login credentials using Internet search engines. Here are some tips to avoid being abused by Google Hacking or other reconnaissance techniques. Continue reading →
IT administrators are being asked to come up with ways to permit mobile devices onto the corporate network in a secure fashion (via MDM Solution or other technology) . This subject touches a few technology areas such as access control, secure wireless, data protection and secure management of mobile devices however the focus for this piece will be mobile device management. Members of my team have tested the MDM leaders such as Mobile Iron, Airwatch, Zenprise, Good Technology, McAfee, Symantec, etc. and summed up the following as things to consider when evaluating a Mobile Device Management solution. Continue reading →
The web is a dangerous place so its extremely important to have web proxy / content filter technology protecting users that access it. I had a roommate years ago who purchased a computer and within hours had every virus, malware and what not clogging his new machine. I’m sure he didn’t have the best surfing habits however that doesn’t mean the average user is less likely to be infected. What most people don’t realize about websites is they are like a Paint By Numbers canvas leveraging other websites to fill in the colors. For example, if you see a RealAudio video on a website, guess what … you have surfed both that embedded video’s website and the host website. The same goes when there are hidden links that download malicious malware on what you believe is a safe website. Continue reading →
If you search the Internet for anti-malware/Virus or attend security conferences, you will find billions of vendors. Which solution is best? There are endpoint and server solutions, network appliances and embedded upgrades for existing applications. What separates the gazillion anti-whatever solutions outside of price? Many claim reaction time however what separates “X Faster Than Y” when most attacks do damage in milliseconds? It’s best to step away from vendors and understand the DATA you are protecting before considering a solution. Continue reading →