Keys to a secret network

Wednesday, 6 October 2004, 2:43 PM EST

Seclarity's SiNic combines hardware encryption and granular policy management to lock down private LANs.

If you want to keep an e-mail message, a file, or a database record private, you encrypt it and you make sure that only authorized users receive the key. Not especially difficult, as long as it involves a single application (such as e-mail), a relatively small amount of data, or only a few users. But how would you bring the same level of security to an entire project or workgroup?

By Brian Chee and Oliver Rist at IT Manager's Journal.

[ Read more ]




Spotlight

Leveraging network intelligence and deep packet inspection

Posted on 26 November 2014.  |  Tomer Saban, CEO of WireX Systems, talks about how deep packet inspection helps with identifying emerging threats, the role of network intelligence, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Nov 27th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //