TITLE

PANDA SOFTWARE LAUNCHES DESKTOPSECURE FOR LINUX

PUB. DATE
September 2006
SOURCE
UNIX Update;Sep2006, Vol. 17 Issue 9, p3
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the launch of DesktopSecure for Linux, a complete security suite for protecting Linux workstations, by Panda Software. The new Panda Software solution includes signature-based detection of malicious code, the Genetic Heuristic Engine, a new technology capable of detecting more unknown malware than traditional heuristics. Unlike similar solutions, the product includes a firewall. The product is aimed at both home users and companies with workstations running Linux, of particluar concern are companies with heterogeneous Windows/Linux environments.
ACCESSION #
22034428

 

Related Articles

  • Everybody Get Inline. Rash, Michael // CRN;1/28/2008, Issue 1258, p36 

    The article offers information about iptables firewalls which give a full-features and stable packet filtering structure. Iptables offer protocol state tracking, network address translation, rate limiting and comprehensive logging. However, its main highlight is its capability to determine and...

  • A Study on the Linux firewall. Yu-Mi Bae; Sung-Jae Jung // Journal of Security Engineering;Oct2011, Vol. 8 Issue 5, p599 

    Linux is based on Unix operating system has variety of Services and has connected by many users. Unnecessarily connections have occurred by many users, these connections cause traffic of system. Linux used TCP Wrapper, ipfwadm and ipchains for connection limit, but now use iptables for packet...

  • PANDA LAUNCHES DESKTOPSECURE FOR LINUX SECURITY.  // UNIX Update;Apr2006, Vol. 17 Issue 4, p5 

    This article features the beta version of Panda Software's Panda DesktopSecure for Linux. The software is designed to protect workstations in Linux environments. DesktopSecure protects both home and corporate workstations with a solution that integrates the most advanced anti-malware protection...

  • Structural Analysis and Preparation of the Netfilter. Yaoqin Zhu // Advanced Materials Research;2014, Issue 926-930, p2418 

    As an open-source Linux system, firewall security and defense capability is very strong. In the whole process of network firewalls, and multiple monitoring points are based on netfilter. This paper analyzes the structure of the netfilter and ipt_entry store, look in everyday applications, Linux...

  • A Mapping Mechanism for Periodic Filters in a Conflict Detection System for Time-Based Firewall Policies. Thanasegaran, Subana; Tateiwa, Yuichiro; Katayama, Yoshiaki; Takahashi, Naohisa // International Journal of Computer Science & Network Security;Feb2013, Vol. 13 Issue 2, p112 

    Recently, time-based filters are introduced in several practical firewalls like CISCO ACLs and LINUX Iptables to control network traffic in time. It is very handy when a service is required to be available at certain times of a day or at certain days. However, network administrators struggle to...

  • BUGS & FIXES. Johnston, Stuart J. // PCWorld;Dec2005, Vol. 23 Issue 12, p57 

    The article offers an update of issues related to the computer industry in the U.S. as of December 2005. Microsoft released a Security Advisory warning about an unexpected behavior in Windows Firewall that could let a clever attacker who had broken into a user's PC leave a back door to the Web...

  • REMNANT INTRODUCES ACTIVE SCANNING FIREWALL LOG PROFILER.  // Computer Security Update;Jul2005, p3 

    The article reports that Remnant Labs Inc. has introduced its next-generation Firewall Log Profiler product. This product release includes significant new features for automatically scanning firewall logfiles for security violations and irregularities. Firewall Log Profiler becomes the first...

  • Mobile firewall protects hand-helds.  // Mobile Radio Technology;Jul2006, Vol. 24 Issue 7, p72 

    The article features the mobile firewall for devices loaded with Microsoft Windows operating system launched by ProtectStar company. The firewall is designed for pockets personal computers and handheld and cellular phones to secure its mobile terminals against unauthorized data access, data...

  • IPolicy IPS device aims low. Greene, Tim // Network World;6/12/2006, Vol. 23 Issue 23, p18 

    The article features the iPolicy 6410, an intrusion-prevention firewall that screens network traffic that is going to be introduced by Policy Networks company in the U.S. The device functions include breaking open packets and then reassembling them in less than 100 millisecond. This also handles...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics