encryption

 

Hacked! Wi-Fi Security Cracked, Tool to Be Released

Beware the security measures taken when it comes to Wi-Fi: From now on, “multilayer” might be the effect to go for. That’s because two researchers in Germany have cracked the Wi-Fi Protected Access (WPA) encryption used by wireless routers. And, they plan to issue a tool next week to help other people crack it too. […]

Cellcrypt Grows Channel to Address Voice Security

Cellcrypt, a supplier of secure voice encryption solutions, aims to appoint key channel partners worldwide to address the increasing concern about voice security. Many individuals and organizations have recognized the issue of voice security, however, traditional encrypted mobile phones have severe limitations, said the company. Cellcrypt Mobile is a software application that, when installed on […]

Perimeter eSecurity Launches Remote Backup and Recovery Service

Perimeter eSecurity is providing a new Remote Backup and Recovery (RBR) product, an on-demand storage engine to securely back up and recover business data. RBR is a fully digital service that allows organizations to maintain a regular backup schedule. Agents now can offer this automated SaaS platform, assuring customers their data will always be available, stored […]

NGT Upgrades 6DegreesIP

Wholesale hosted VoIP provider New Global Telecom (NGT) this week released version 3.4 of its 6DegreesIP VoIP product. New developments include: availability of LineSider Communications’ SecureVoIP voice encryption technology; front-end order entry and provisioning capability for customers; and a limited-time promotion around NGT’s integrated TelPack Toolbar, which allows end users to make and accept telephone […]

Jasomi Networks Releases New Version of Session Border Controller

Jasomi Networks Inc. on Wednesday unveiled version 3.3 of its PeerPoint line of session border controllers. "Similar in scope to firewalls, session border controllers allow administrators to define and enforce policies for VoIP signaling and media streams as they cross from one side of a network edge to another," Todd Simpson, chief operating officer of […]

Safe & Sound Business

Posted: 1/2003 special report To Serve & Protect Safe & Sound Business Partners Find Opportunities with Network Security By Tara Seals IN AN AGE OF IP-BASED VOICE, video and data communications, trillions of packets of information fly around the planet, thanks to company and governmental networks that route information to those allowed to see it. […]

On Premises: VPN Users Migrate to Managed Services

Posted: 04/2000 VPN Users Migrate to Managed Services By Brian Schulz Enterprise e-business opportunities are driving demand for flexible and secure wide-area communications. New requirements are wrapped with Internet connectivity and IP networking advances that include guaranteed quality of service (QoS) and service level agreements (SLAs) networkwide.With these capabilities, IP-based virtual private network (VPN) service […]

1 3 4 5
The ID is: 91808