Online Protection Without Intrusion

Sausner, Rebecca
November 2006
Bank Technology News;Nov2006, Vol. 19 Issue 11, p51
Trade Publication
The article presents information on a new firewall desktop used by the Community Bank for online security. According to the bank's information security officer Aaron Friot, the system offers intrusion prevention without the constant sitting of the employees, and is user-interactive. The intrusion protection product is called "Blink," and is developed by eEye Digital Security. The system has an inbuilt systems firewall, and a malware engine for detecting spyware.


Related Articles

  • AppShield edges InterDo in battle of Port 80 filters. Powell, Thomas // Network World;8/18/2003, Vol. 20 Issue 33, p48 

    Evaluates several software-based Web application firewalls. Sanctum's AppShield 4.0; KaVaDo's InterDo 3.0; eEye Digital Security's SecurellS 2.0; Pros and cons; Retail price; Ease of use; Installation.

  • DVD Contents.  // Australian PC User;Sep2007, Vol. 19 Issue 9, p6 

    The article presents a list of several computer security programs. Among the antispyware and spam filters include the Spyware Doctor, Spam Monitor and Comodo BOCLean Anti-Malware. Also included are various Internet firewalls such as the PC Tools Firewall Plus, the Comodo Free Firewall and the...

  • Free Programs Can Speed Your Computer. Engerbretson, David // SDM: Security Distributing & Marketing;Mar2008, Vol. 38 Issue 3, p181 

    The article discusses how to protect personal computer from malware and other nefarious software bits from taking up residence. It is advised not to click on an embedded link in an e-mail for many times spyware or malware enters on these links. The personal computer should have a firewall...

  • Crafty Spyware. Jones, Petra // Crafts Report;May2008, Vol. 34 Issue 385, p48 

    The article offers tips to protect craft businesses from destructive spywares. Spyware is a computer software which manages to install itself without the user's consent. This is dangerous because it can record important movements online including electronic mails and online banking passwords. It...

  • Runaway E-Mail. Stearman, Sam // National Public Accountant;Apr/May2005, Vol. 4 Issue 2, p46 

    The article discusses the author's computer software being used for computer security. The author claims that he uses Norton System Works 2004, an anti-virus program. He adds that he also uses Zone Alarm, an Internet Firewall that detects any program trying to access his computer's Internet...

  • NOT YOUR MOTHER'S ANTIVIRUS. Zeltser, Lenny // Information Security;Oct2011, Vol. 13 Issue 8, p41 

    The article focuses on the evolution of antimalware tools, how a virus works and the purpose of an antivirus. It discusses core antivirus functionality, spyware and rootkit protection and host firewall and intrusion prevention. The author suggests determining the overall benefits of the...

  • RADIALPOINT UNVEILS ON-DEMAND SECURITY TEST.  // Computer Security Update;Jan2008, Vol. 9 Issue 1, p6 

    The article provides information on Radialpoint Co. and its product called Security Advisor which allows user to scan their personal computers (PCs) for the presence and proper functioning of virus, spyware and personal firewall protection. The tool teaches users about security risks by...

  • Securing Vista apps. Vines, Rose // Australian PC User;Feb2009, Vol. 21 Issue 2, p74 

    The article presents the author's suggestions concerning computer security. The author suggests keeping the applications patched using Secunia's free Software Inspectors. The online inspector is stated to spot the most egregious flaws. Other suggestions include using a firewall, configuring the...

  • 5 STEPS to overcome INTERNET FEARS. Hest, David // Farm Industry News;Jan2007, Vol. 40 Issue 1, p65 

    The article offers tips to ensure Internet-connected computer security. Protection for computer with Internet connection from viruses, bugs and hackers can be improved. The tips are recommended by Deputy of Internal Affairs Ron Gabrielson of the Geek Squad. They include installing hardware-based...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics