While Antivirus vendors struggled this week to keep up with the latest permutations of this worm that affected CNN, Disney, ABC and countless other businesses running Windows 2000, PivX Solutions' active system hardening
technology has blocked all variants of this worm at the core.
All of this, combined with Aventail's proxy architecture, flexible authentication options, strong cryptography, granular access control, and improved system hardening
, makes ASAP a highly secure platform.
0 also includes an update to the S-Lok(TM) product which provides a comprehensive System Hardening
Solution that dramatically enhances OS security by appropriately setting system registry, security database and file system ACL's.
Microsoft ISA Server provides an extensible, multi- layer enterprise firewall featuring security with packet-, circuit-, as well as application-level traffic screening, stateful inspection, integrated virtual private networking (VPN), system hardening
, integrated intrusion detection, and Web caching for accelerated services.
Mick Bauer, O'Reilly author of Building Secure Servers with Linux and Security Editor for the industry standard magazine, Linux Journal Magazine, will lead the comprehensive seminar "Linux Security 101," which includes detailed discussions on the basic principles of server security and system hardening
with demonstrations of popular security tools.
Using Active System Hardening
technology, Qwik-Fix Pro combines automatic remediation of critical software security flaws with targeted configuration management.
Gorilla Consultants has established itself as a Microsoft Go-To-Partner in Auditing, Network Systems Architecture Design and Planning, Implementation, Policy, Recovery, System Hardening
, and Certified Training.
A successful Windows security strategy starts with installing at least one solution from each category of anti-virus, firewall, spyware and system hardening
Key Functionality: Vulnerability Management -- Scans the network to identify rogue Web server installations and security issues like vulnerable cookies, dangerous links or inappropriate content -- Runs tests on Web server configurations, access controls, CGI/vulnerable directories -- Performs system hardening
checks -- Produces comprehensive information on: * why the vulnerability is significant * how to correct a vulnerability Key Functionality: Intrusion Management -- Actively Monitors Web Server Requests -- If suspicious activity is detected, the request is blocked and the activity is logged.