TITLE

Cisco, IBM Integrate Business Security

PUB. DATE
February 2004
SOURCE
Electronic News;2/16/2004, Vol. 50 Issue 7, pN.PAG
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the integration of products planned by IBM and Cisco Systems to allow customers to build self-defending, security environments for systems, applications and networks. Aim of the integrated security technologies of the companies; Solutions and software covered by the integration; Availability of the integration.
ACCESSION #
12509469

 

Related Articles

  • Cisco, IBM Integrate Business Security.  // Electronic News;3/1/2004, Vol. 50 Issue 9, pN.PAG 

    Reports on the plans of IBM and Cisco Systems to integrate their various business security products for computer systems, applications and networks as of March 18, 2004. Capabilities of the integrated security technologies; Products to be included in the integration; Plans of IBM to join the...

  • Outsource your network assessment--sometimes.  // InfoWorld;02/08/99, Vol. 21 Issue 6, p80 

    Evaluates Cisco Systems Inc., IBM Corp., International Computer Security Association, Ernst & Young and L0pht Heavy Industries on its capability in assessing network security. Three primary issues to consider when hiring a network consultant; Best way of assessing networks; Network security...

  • Cisco teams with IBM on infrastructure security. Hochmuth, Phil // Network World;2/16/2004, Vol. 21 Issue 7, p14 

    Reports on a collaboration between Cisco Systems Inc. and IBM Corp. on network infrastructure security. Terms of the deal; Benefits to security managers; Significance of the deal to both companies.

  • Cisco, IBM team on net access. Dubie, Denise // Network World;10/18/2004, Vol. 21 Issue 42, p12 

    This article explains that Cisco Systems and IBM Corp. will tie together products that give customers better network access control and help prevent worm and virus attacks. Updates to IBM's Tivoli system software would work with Cisco gear to scan devices trying to connect to corporate networks....

  • Vendors set to advance security plans. Messemer, Ellen // Network World;3/8/2004, Vol. 21 Issue 10, p20 

    Reports that information technology vendors are pursuing a variety of security initiatives to rein in the worst effects of problems such as worm attacks. Sun Microsystems' Solaris 10.0 which will be more fault-tolerant and more resistant to intrusions; Cisco's Network Admission Control (CNAC)...

  • IBM and Cisco integrate security tools to control network access. Saran, Cliff // Computer Weekly;2/24/2004, p35 

    The article reports on the collaboration between IBM and Cisco to integrate security tools to control network access. Both companies have introduced a set of products and services that will share security information to control access to corporate networks. According to Vincent Bieri, business...

  • Emphasis on Branch Sparks IBM-Cisco JV. Lee, W.A. // American Banker;11/25/2002, Vol. 167 Issue 226, p1 

    Reports that computer companies International business Machines Corp. (IBM Corp.) and Cisco Systems Inc. have set up a joint venture called Branch Transformation Network aimed at helping banks in automation. Conversion of some of IBM Corp.'s financial industry customers to the Linux-based...

  • FastFacts.  // Inter@ctive Week;06/12/2000, Vol. 7 Issue 23, p36 

    Reports on various issues concerning business-to-business (B2B) commerce on the Web as of June 12, 2000. Joint venture between Cisco Systems and General Electric; Alliance formed by IBM with Intentia International; Information on FXall.com, a B2B exchange.

  • Cisco, IBM Integrate Business Security.  // Electronic News;2/23/2004, Vol. 50 Issue 8, pN.PAG 

    Reports on the agreement between IBM Corp. and Cisco Systems to integrate their business security technologies. Functions of the integrated security technologies; Terms of the agreement.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics