Firewall market blazing, up 143%

Hochmuth, Phil
August 1998
Network World;08/24/98, Vol. 15 Issue 34, p27
Trade Publication
Looks at the increase growth experienced by Internet firewall vendors. Factors which contributed to growth in the market; Development of interest shown by companies in Internet security; Appointment of Check Point Software Technologies company as the top firewall vendor in the United States.


Related Articles

  • Businesses want better security on the Net.  // CA Magazine;May96, Vol. 129 Issue 4, p9 

    Presents information from the Ernest and Young's survey on security on the Internet that tells what businesses expect from the Internet. Participants of survey; Dissastisfaction of Internet-connected respondents; Admittance of most companies; Biggest threat to information security on the...

  • Without a net. Lombardi, Rosie; Williams, Deryck // CA Magazine;Aug97, Vol. 130 Issue 6, p33 

    Presents information as it relates to the security of the Internet. Reference to some of the security threats which Internet users experience; Details on the use of the Internet; Details on risks which businesses encounter when launching Web sites. INSETS: Internet buzzwords: A...

  • Digital Watermarking: Protection from Internet pirates. Hubbard, Kim L. // Business Journal Serving Southern Tier, CNY, Mohawk Valley, Fing;12/21/98, Vol. 12 Issue 26, p1 

    Reports that Information Directorate has developed a technology for embedding a secure, digital watermark into digital images that can be used to protect Web sites from Internet piracy. Overview on Internet piracy of digital images; Authentication of copyright claims as the primary function of...

  • Your Internet site may not be as secure as you think. Chapman, Christy // Internal Auditor;Feb96, Vol. 53 Issue 1, p9 

    Reports that Computer Security Institute found that there have been breaches in security on Internet sites. Ratio rate for security breaches; Results of survey.

  • Getting past security. Bucholtz, Chris // Telephony;3/17/97, Vol. 232 Issue 11, p105 

    Features the changes made to firewall security to securely transmit video and voice over Internet calls. Meaning of firewall; Reason for modification of the firewall software; Creation of a method for signal structure; Need for interoperabilty standard for accession of large numbers of...

  • The real security blanket. Titch, Steven // Telephony;05/05/97 Supplement, Vol. 232 Issue 18, p44 

    Talks about Internet security. Creation of highly secure intranets for corporate customers; Role of Internet service providers to help clients get past the emotional elements of security; Educating users to the realities of security.

  • The Internet goes crackers. Wilson, David L. // Education Digest;May95, Vol. 60 Issue 9, p33 

    Focuses on the issue of security in the Internet. Cost of security devices against the new wave of intrusions into computers connected to the computer network; Techniques used by computer hackers; Inefficiency of security devices; Financial and technical impact of computer intrusions.

  • Internet trade security sought. Coffey, Murray // Crain's Small Business -- Chicago Edition;Sep96, Vol. 4 Issue 7, p5 

    Presents information on the increasing problems of security regarding the Internet while giving information on the efforts of the Commission on Electronic Commerce and Crime. Information on the drafting of legislation which would ensure the authenticity and enforceability of online contracts;...

  • Law of the cyberland. Macht, Joshua // Inc.;9/12/95 Special Bonus Issue, Vol. 17 Issue 13, p17 

    Looks at possible legal problems for companies that give their employees unlimited access to the Internet. Recommendations from Barry D. Weiss, a partner at a Chicago law firm; Authorization codes; Limiting downloading; Other suggestions.

  • `Clever, nasty and definitely antisocial.'  // Newsweek;11/14/1988, Vol. 112 Issue 20, p24 

    Report on a `virus'--a program slipped into a computer for a prank or to sabotage--that recently infected Internet, a network linking up to 50,000 machines worldwide. The program seems to have done no lasting damage and didn't infect classified systems. Virus; How it works.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics