December 2005
UNIX Update;Dec2005, Vol. 16 Issue 12, p1
Trade Publication
This article reports on the announcement of Protegrity Corp. that Secure.Data, the software solution of the company for centralized management and auditing of data security policies and data encryption, now supports Oracle 9i and 10g running on Red Hat Enterprise Linux AS 3.0 and 4.0. With this latest version of Secure.Data, Protegrity now offers the market's only end-to-end security solution for Red Hat Enterprise Linux. Protegrity's Defiance TMS, a web application security solution for managing threats and vulnerabilities, also supports Red Hat Enterprise Linux.


Related Articles

  • Why a £75 outlay could have saved Nationwide £1,m. McKelvey, Charlie // Precision Marketing;2/23/2007, Vol. 19 Issue 9, p12 

    The article introduces encryption software as a solution to computer data leakage in Great Britain. The author claims that with the boom of computer technology, data thefts has been rampant , and needs action from the government. Due to information losses, some companies have experienced several...

  • Encrypt your data. Bradley, Helen // Australian PC User;Aug2005, Vol. 17 Issue 8, p121 

    Shows how to secure data using the Paragon Encrypted Disk software. Significance of using an encrypted disk; Steps in creating a new encrypted disk.

  • No fear peer-to-peer. Warne, Dan // Australian Personal Computer;Oct2003, Vol. 23 Issue 10, p148 

    With the copyright police increasing its monitoring of popular file-sharing networks like KaZaA and eDonkey, savvy users are turning to WASTE, a new program that relies on file encryption and ad hoc networks of trusted members to escape prying eyes. What makes WASTE different from other...

  • ZoneAlarm Pro 4.  // Australian Personal Computer;Jul2004, Vol. 24 Issue 7, p76 

    Firewalls are evolving to provide protection against pop-ups, advertising and cookies as well as restricting the flow of personal information. ZoneAlarm Pro is unusual in that it's suitable for both the paranoid Internet user and the average home user. It provides home users with a solid level...

  • Security Software for Individual Personal Computers Released.  // Black Issues in Higher Education;7/1/2004, Vol. 21 Issue 10, p37 

    Announces the launch of the personal computer (PC) security software product Essential Security Suite from Dallas, Texas-based company Essential Security Software in June 2004. Features of the encryption software for use on individual PC; Benefits of the security software for individual and...

  • Securing Communications and Files. McBride, Matthew // Searcher;May2004, Vol. 12 Issue 5, p46 

    The article examines the effectiveness of the Blowfish and the Pretty Good Privacy (PGP)/GnuPG software in providing security during information transfers. Local area networks are inherently insecure in most corporate, academic, even broadband cable environments, especially with regards to...

  • Multi-Segment Steganography Technique. Alnawok, Fayik; Ahmed, Basem // International Arab Journal of Information Technology (IAJIT);Jul2008, Vol. 5 Issue 3, p253 

    The idea of this paper is to invent a new strategy in steganography to get the minimum effect on the images which is used to hide data into it. This is by dividing the original image into a number of segments, these segments is achieved according to the number of characters included into the...

  • Better Encryption Makes CryptoLocker a Threat. Lemos, Robert // eWeek;11/29/2013, p2 

    The article discusses developments on computer security as of November 2013. It features the malware called CryptoLocker or Crilock, which uses strong encryption, domain-generation algorithms and a deadline of payment for the key to unlock information. The opinion of Bit9 chief security officer...

  • A Shuffle Image-Kncryption Algorithm. Yahya, Abdelfatah A.; Abdalla, Ayman M. // Journal of Computer Science;2008, Vol. 4 Issue 12, p999 

    Image encryption needs to be secure by resisting statistical attacks and other types of attacks. Approach: The new algorithm, call it the Shuffle Encryption Algorithm (SEA), applies nonlinear s-box byte substitution. Then, it performed a shuffling operation partially dependent on the input data...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics