Saturday, July 28, 2007

Prism Microsystems and Type80 Extend the Power of Log Management to the Mainframe Environment

Partnership provides large companies with unparalleled security and operational visibility that extends from the mainframe to the application level.

Columbia, MD (PRWEB) July 27, 2007 -- Responding to a growing need for log management for mainframe environments running IBM's z/OS, Prism Microsystems, developers of the EventTracker "logging in-depth" solution (www.eventlogmanager.com), today announced a strategic partnership with Type80, an industry leader in mainframe based intrusion detection and security event notification. By bringing together best-of-breed technologies, this partnership will help large companies integrate log data generated by mainframes with other distributed systems for enterprise-wide centralized log monitoring, analysis and reporting.

For many large organizations, the mainframe remains a platform of choice for business-critical applications that process and maintain large volumes of sensitive data. Although historically secure, mainframe systems are increasingly hosting a number of web-based applications and are accessible by various network services. Coupled with an alarming increase in unauthorized intrusions, increasing compliance regulations and the growing industry focus on data security, companies must align their existing mainframe environments with an overall Log Management solution to allow them to quickly respond to mainframe-based security violations and other compliance and system based events.

"Our partnership with Type80 allows our customers to benefit from a real-time view of critical mainframe log data that is correlated with data from other sources across the organization for complete security and operational visibility" says Steve Lafferty, VP of Marketing, Prism Microsystems Inc. "This integrated approach provides large companies with unparalleled coverage that extends from the mainframe to the application level and provides staff with convenient centralized access to all log data, without the need for system specific technical expertise."

EventTracker and Type80 together extend end-to-end business visibility to enterprises running IBM z/OS Mainframes with their combined capabilities. Type80 agents collect mainframe SMF, console and write-to-operator messages while EventTracker agents collect all log data from other sources including Windows, Unix/Linux, Solaris BSM, SNMP devices and software applications. This data is sent to the EventTracker console in real-time where it is analyzed and made available for review and reporting.

EventTracker is designed to be an easy to deploy, scalable solution that automates the central consolidation, analysis and reporting of log data and enables tracking of all system and user activity. With Type80's support, this capability is now extended to the Mainframe as well. "We want our customers to know that no matter what systems they choose to implement, we are committed to meeting their log management needs" adds Lafferty.

About Type80 Security Software
Type80 is a privately owned IBM "Software in Development Partner". Type80 Security Software was founded by experts in the areas of Systems Programming and information security. The founders draw from a diverse background, from providing security training to NATO counter intelligence, conducting enterprise-wide security assessments for companies maintaining the nation's critical infrastructure, and developing high-level mainframe applications for major financial institutions.

About Prism Microsystems
Prism Microsystems, Inc. was formed in 1999 and is a privately held corporation with headquarters in the Baltimore-Washington high tech corridor. The company delivers business-critical solutions to consolidate, correlate and detect changes that could impact the performance, availability and security of a company's IT infrastructure.

EventTracker, Prism's enterprise event management solution, is designed to enhance the security of critical systems, maintain confident compliance, and improve overall performance and availability. EventTracker is engineered for ease of use and flexibility and has over 600 customers in 50 countries across multiple sectors. Visit www.eventLogManager.com for further information.

source

SAIPL Launched SwamiLaptops (http://www.SwamiLaptops.in)

India(SANEPR.com) July 27, 2007 -- After the great success of SwamiPc (http://www.SwamiPC.in) – India’s first and only online PC shop, SAIPL continues to grow further and ventures into laptop reselling business by launching SwamiLaptops (http://www.SwamiLaptops.in)

SAIPL aims to provide all the branded laptops under one roof from its online shop SwamiPC (http://www.SwamiPc.in). SAIPL has tied up with all the international and national laptop manufacturers to offer customers a wide choice of laptops.
Acer, Sony, Toshiba, HP, Lenovo and Apple laptops are already available from SwamiPC online shop. The company is also in talk with major national manufacturers to offer their laptops from its online shop.

SAIPL also extends its sensational finance options for Laptops and EMI scheme.

SAIPL plans to separate the Laptop online shop by launching SwamiLaptops in UK (http://www.SwamiLaptops.co.uk) within a month.

With this launch Saipl will cover the complete range of IT products availability on online shop.

Saipl already offers IT products, Desktop PC, Laptops and other PC accessories on SwamiPC online shop (http://www.SwamiPC.in). SwamiPC is India’s first and only online PC shop.

Saipl is committed to provide excellent product at the cheapest price. The other uniqueness includes lifetime 24x7 telephonic technical support and exceptional warranty on its products.

SwamiLaptops also offers 24x7 online chat facilities for website visitors. SwamiPC and SwamiLaptops are only online shop in whole world offering 24x7 online chat facilities.

Within 1 year of its launch SwamiPC website has become the most visited online PC shop in India. SwamiPC has created a sensation by becoming India’s first and only online shop.

Saipl’s parent company A K Singh Limited is also planning to launch UK version of SwamiPC and SwamiLaptops soon.

source

Monday, July 23, 2007

Ongoing Operations Partners with Blue Ridge Networks to Enhance Client Data Communications

Ongoing Operations, LLC, a leader in the credit union industry providing Disaster Recovery and Business Continuity solutions, announced a strategic relationship with Blue Ridge Networks to promote and distribute their Blue Ridge/Secure Virtual Ethernet Service (SVES) to credit unions they are serving nationwide.

Hagerstown, MD (PRWEB) July 23, 2007 -- Ongoing Operations, LLC announced a strategic relationship with Blue Ridge Networks to promote and distribute their Blue Ridge/Secure Virtual Ethernet Service (SVES) to credit unions they are serving nationwide.

Ongoing Operations is a leader in the credit union industry providing Disaster Recovery and Business Continuity solutions throughout the United States. Data communications is a critical function. Prior to this announcement, Ongoing Operations has relied on traditional MPLS, point-to-point and frame relay technology to provide backup communications. The Blue Ridge solution replaces those technologies with up to 10 times the speed, rigorous security and significant cost reductions.

We are proud to offer the convenience, mobility and flexibility of Ethernet-based connectivity to our clients
Ongoing Operation's CEO, Kirk Drake, explained that the new SVES would significantly increase the performance and security of data transmissions. ''As we provide assistance to regulated financial institutions, we pursue every opportunity to improve security and boost performance,'' said Drake. ''Blue Ridge/Secure Virtual Ethernet Service will help deliver those improvements while reducing our clients' communications costs.''

"We are proud to offer the convenience, mobility and flexibility of Ethernet-based connectivity to our clients," said Drake.

''We are very excited about our partnership with Ongoing Operations and are pleased that they have chosen Blue Ridge/Secure Virtual Ethernet Service to provide credit unions everywhere with the most secure, reliable and cost-effective network solution available today,'' said Mike Fumai, CEO of Blue Ridge Networks. "SVES continues to offer one of the greatest cost-reduction opportunities today for organizations seeking to reduce their dependence on carrier-based network services."

About Ongoing Operations
Founded in 2005, Ongoing Operations, LLC is one of the fastest growing Disaster Recovery/Business Continuity companies in the nation. Ongoing Operations is a Credit Union Service Organization (CUSO) solely serving the credit union industry. It was designed to accomplish two key tasks. First, effectively solve a business continuity need for Credit Unions nationally. Second, to provide a member service enhancement or eliminate an alternative expense for the credit unions. In addition to proving all the traditional IT Infrastructure-type services, the company also works hard to focus on solving business continuity for the entire credit union operation. Ongoing Operations is headquartered in Hagerstown, Md. with additional facilities in Oregon. See more information at www.ongoingoperations.com

About Blue Ridge Networks
Blue Ridge Networks is a respected and leading provider of unparalleled security solutions for government and private industry. The company's products have a proven ability to exploit the advantages of the internet and are relied upon by hundreds of large enterprises. Blue Ridge solutions represent high standards of security strength as tested and certified by independent organizations. The company's products have earned: FIPS 140-2, Common Criteria, Joint Interoperability Test Command (JITC), ARMY TIC, and Department of Defense SPOCK certifications. Additionally, they comply with important HIPAA, HSPD-12, and PCI regulations. Information about the company's products and managed services can be found by visiting www.blueridgenetworks.com.

source

Sunday, July 22, 2007

Promisec Stops Threat of BOTNET Attacks Overtaking Corporate PCs

New York, New York, USA. (SANEPR.com) July 20, 2007 -- Promisec™ Ltd, announced today that the company’s endpoint security technology stops the growing threat of BOTNET attacks from hijacking corporate computing environments by using a comprehensive approach to layered security, preventing crippled network activity and business disruption. Promisec recognizes BOTNET armies, also known as Zombie armies, as the IT security attack of choice for criminals since it allows them to leverage a corporation’s entire network of computers for unlawful spamming or malware distribution at a very high rate, raising legal questions, but also slowing corporate computing to a crawl.

A BOTNET consists of a number of computers that have been compromised to become part of a BOTNET used by a miscreant to launch attacks such as a distributed denial-of-service, spam, viruses and other attacks on a single or large number of computers connected to the Internet. A computer hijacked in this way is called a BOT, and becomes part of a BOTNET controlled by a ‘BOTHERDER.’ Those who create and send BOTNET attacks are typically motivated to damage one or more computing networks or to profit from their activity by creating large spam engines that result in service outages. The FBI, in what it dubbed Operation BOT Roast, recently shut down a major BOTNET and arrested the ring leader, who had infected more than one million computers. The suspect faces 20 years in prison if convicted.

Recommended processes to ensure corporate networks remain free from attacks include implementing a network security strategy with the following layers:
• Up-to-date anti-virus software
• Up-to-date anti-spyware software
• Automated OS vendor patching, such as Windows Update
• Software or hardware firewall
• Endpoint security management software to provide single location management of all these security layers and manage policies to ensure proper third party security software operation.

“BOTNETS are of grave concern because they can operate in large numbers without being noticed, meaning a network could shutdown from the traffic surge alone,” said Amir Kotler, CEO of Promisec. “Beyond serious disruptions in business continuity, corporations can potentially be held hostage – literally asked to pay ransoms that can cost millions of dollars – by the source of many spam, viruses, malware and denial-of-service attacks thundering from personal computers onto their networks. Organizations need to be aware of how BOTNETs can propogate, and how to detect and prevent these infections by implementing a comprehensive layered security solution.”

Experts agree that a layered security approach provides the greatest level of protection for enterprises. Layered security solutions are designed to protect sensitive system resources on the network, delivering added assurance that if one security layer fails, another layer of security will stop an attack. Promisec Spectator Professional stops BOTNET armies by identifying infiltration at the endpoint and removing the startup commands and executables that allow BOTNETs to operate almost undetected on innocent workstations. Promisec also looks for IRC software which is used to communicate within a BOTNET and remove it, effectively severing the host from the BOTNET. Because Promisec monitors unauthorized processes in addition to deviant software, networks protected by Promisec are able to identify infected PCs and clean them before a BOTHERDER starts using them for nefarious activities.

Promisec’s white list capabilities enable organizations to detect infected computers through the startup commands, applications, processes and services which make up the BOT. By identifying these deviations from the standard, dormant BOTs hiding in the system are more easily identified. This is important because unlike other malicious code BOTs can be dormant for a very long time before they are activated, similar to terrorist sleeper cells. The actual command and control infrastructure often uses IRC channels. Being able to identify unauthorized chat programs and removing them will sever the command infrastructure and therefore prevent the BOT from being used to launch an attack. Promisec’s extensive black list includes a very large number of chat programs which can be identified and uninstalled. Combined, Promisec’s capabilities offer a powerful tool for preventing computers from being used to launch a attacks.

About Promisec Spectator Professional
Promisec Spectator Professional provides small and medium businesses (SMBs) with a complete security solution that protects against threats originating within the network. Attacks may be caused by the organization’s users, business partners or by technical mis-configuration. This software-only solution is normally installed on an administrator’s desktop or on a dedicated server in the SOC/NOC (Security/Network Operations Center).

Promisec Spectator Professional works seamlessly with existing gateway security solutions that enhance and complement each other and with third party desktop security agents in order to provide total security for both the network perimeter and the internal organization. With detection, repair, prevention and monitoring modules, Promisec Spectator Professional delivers a comprehensive solution to manage security on all organization network endpoints and servers. Promisec Spectator Professional identifies threats that have bypassed gateway or desktop security systems and embedded themselves in the network - rogue access points, USB devices or any other peripheral added to any network endpoint or server, and unauthorized processes or applications. Leveraging remote remediation technology from a centralized management console, Promisec Spectator Professional enables security administrators to remotely kill harmful processes, remove unauthorized applications or commands and reverse dangerous registry changes, either automatically or manually from their own workstation.

Promisec Threat Expert Center
To learn more about emerging security threats or to inquire about the Promisec network security audit service, please contact threatexpert@promisec.com.

About Promisec, Ltd.
Promisec, Ltd. is an award-winning technology leader in agentless endpoint security management software. The company offers industry proven internal network security solutions in use by Global 2000 organizations, including AGF, AmeriQuest and Comverse. The company’s products Promisec’s Spectator and Promisec Spectator Professional for Enterprises, protects against business disruption from internal network threats with the only agentless endpoint security software to deliver both monitoring and remediation and the ability to manage third-party security products for a layered approach to corporate network security. Privately held and founded in 2004, Promisec’s main headquarters are located in Israel with offices in New York, Boca Raton, London and Paris. The company’s U.S. headquarters are located at 461 Fifth Avenue, 8th Floor in New York City, NY 10017. Visit the Promisec Web site at www.promisec.com .

source

Exceptional Software Expands Physical Security Services Capabilities

Pivot3 and CBL Systems partner with Exceptional Software's Physical Security Services team, join GSA schedule.

Linthicum, MD (PRWEB) July 20, 2007 -- Exceptional Software Strategies, Inc. is pleased to announce the expansion of its Physical Security Services (PSS).

ExceptionalSoftwarelogo.jpg

Exceptional Software brings a new dimension to Physical Security Services by providing the ability to integrate, manage, manipulate, process, and disseminate physical security data of all types with an extensive set of customized analysis tools. These functions could range from simple streaming video, access logs, and sensor alarms and alerts, to complex video analysis, robust data storage, or a flexible web portal allowing user-friendly access to security tools, controls, and data, to name just a few.

PSS compliments this security software by supplying and integrating comprehensive physical security solutions which span a variety of technologies and vertical market applications, including video analytics, IP cameras, display systems, video storage solutions, sensor technologies, and access control systems.

PSS, spearheaded by John Griffin, will help the company expand its role as a leading provider of IT solutions and services to the U.S. Government, educational institutions, and private industry. "Exceptional will be better able to design and specify products for network-based physical security systems that provide greater control and protection," said Ray Bowen, President and Co-Founder of Exceptional. "Our clients will reap the benefits of how IP networking integrates with physical security."

Exceptional's teams of experts specialize in assessing critical infrastructure security needs, and providing cost effective solutions to counter threats. "We have the competency to carry out vulnerability and risk assessments, participate in the development process from conception to completion, and provide the final commissioning," said Vice President & Co-Founder Paul Stasko. "Physical Security Services are a means to provide our clients with the best security options available today in a comprehensive Exceptional package. That package also includes cleared personnel and our own SCIF (Sensitive Compartmented Information Facility). In addition, Exceptional is a Certified 8(a) and MBE (Minority Business Enterprise) Company."

As part of the Physical Security Services Initiative, Exceptional has recently formed two new partnerships. These are with Massachusetts-based CBL Systems, and Texas-based Pivot3. Exceptional Software will be reselling several CBL and Pivot3 products, and will be offering these technologies on the Exceptional GSA schedule.

CBL Systems is an industry innovator of IQ Smart Switches for the IP physical security market. The IQ Smart Switch is ideally suited for the security industry. Its highlights include easy installation, network scalability, and extraordinary network reliability and redundancy. These features virtually eliminate network downtime, and offer the lowest total cost solution.

Pivot3 produces distributed block-based data protection utilizing software-based virtual RAID controllers. This technology creates a flexible virtualized storage infrastructure, and easily supports dynamic environments with changing workloads. It provides cost-effective, highly-available block storage for data intensive applications.

Exceptional is looking to partner with other physical security technology providers and integrators to help provide physical security solutions to its customers. For more information about Exceptional's Physical Security Services, please contact John Griffin at 866-239-7778.

About Exceptional Software Strategies, Inc.:
Founded in 1996, Exceptional Software continues to grow as a leading provider of information technology solutions and services to the U.S. Government, educational institutions and private industry. We are certified by the U.S. Government Small Business Administration (SBA) as an 8(a) corporation, by the Maryland Department of Transportation (MDOT) as a Minority Business Enterprise (MBE) and by the National Minority Supplier Development Council (NSMDC) as an MBE. For more information about Exceptional Software Strategies Inc. please call 866-239-7778 or visit http://www.exceptionalsoftware.com

About CBL Systems:
With customers around the world, CBL Systems: The Security Switch Specialist, designs and manufactures Ethernet Smart Switches for the security industry, and LonWork Systems for the building automation market. CBL Systems' innovative Self-Managed IQ Smart Switches offer Plug-and-Go, redundant, self-healing capabilities utilizing Intelligent Quasar technology. CBL Systems' patented Ethernet and LON solutions provide reliable transport of data and video for mission critical applications to the security, building automation, access control, and intelligent transportation markets. For more information, please call 888-422-9760 or visit the company's web page at www.cblsystems.com

About Pivot3:
Founded in 2003, Pivot3 has developed the first successful implementation of distributed block-based data protection utilizing software-based virtual RAID controllers. The company's block-based infrastructure virtualization solutions reduce costs by up to 50 percent, and allow systems to deliver up to five times the performance with superior data protection. With several patents pending, the company boasts strong intellectual property, and is backed by Lightspeed Venture Partners and InterWest Partners. For more information, please cal 1-877-5-PIVOT3 or visit the company's website at www.pivot3.com.

source

 
patch Hacker cracker austin dwi texas cyber crime keygen crack