TITLE

Real-Time Response To Malware Slashes Threats

AUTHOR(S)
Jepson, Kevin
PUB. DATE
July 2011
SOURCE
Credit Union Journal;7/18/2011, Vol. 15 Issue 27, p16
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the anti-virus engine and virus signature service Zero-Day Scan (Z-Scan) to block real time internet threats, which is provided by the Houston-based Network Box Corp. Ltd., for the unified threat management (UTM) of AMOCO Federal Credit Union (FCU) in Texas City, Texas.
ACCESSION #
63298911

 

Related Articles

  • AFCU Flies Higher After Purging Multiple Systems For 1 App. Jepson, Kevin // Credit Union Journal;7/21/2008, Vol. 12 Issue 29, p17 

    The article provides information on the new software application, Network Box E-1000x, a unified threat management (UTM) program, used by the Air Force Credit Union (AFCU) in San Antonio, Texas. With the use of this technolgy, it gave AFCU the edge against malicious Web threats. Moreover, the...

  • AMOCO FCU Kicks Off TV 'Reality Show' Style 'Earn Or Burn' Savings Challenge. Blumenfeld, Matt // Credit Union Journal;5/4/2009, Vol. 13 Issue 18, p9 

    The article announces that the Amoco Federal Credit Union has signed up an agreement with a local television (TV) station in Texas. As part of the 10-month project agreement, the company has created a reality show entitled "Earn or Burn Money Challenge," and will adopt four families on their...

  • Dividends.  // Credit Union Times;2/9/2011, Vol. 22 Issue 5, p21 

    The article offers news briefs related to credit unions (CUs) in the U.S. The AMOCO Federal Credit Union has paid out one million dollars in bonus dividends and loan interest refunds to its members. Eastman Credit Union has announced its plan to pay four million dollars dividend to eligible...

  • Network Box reinforces world-class status. Chee-Sing Chan // ComputerWorld Hong Kong;Jun2011, Vol. 28 Issue 5, p82 

    The article announces that Network Box S-Scan Content Filtering Engine has won the Content Filtering/Anti-Spyware Award at the 2011 Computerworld Hong Kong awards.

  • CYBER-ATTACKS SPUR INNOVATIVE SECURITY APPROACHES. Kontzer, Tony // Baseline;May/Jun2011, Issue 110, p24 

    The article focuses on the innovative efforts of several information technology (IT) executives for the prevention of cyber attacks in the U.S. Gary Doan, IT vice president at Dallas Telco Federal Credit Union, prevalence of cyber attacks and cites their move to mitigate such threats through...

  • Leicester College agrees infosec outsourcing deal.  // SC Magazine: For IT Security Professionals (UK Edition);Feb2004, p8 

    Reports on the decision of Leicester College in Great Britain to update information security through a managed security appliance from the company Network Box. Background on the information networks of the college; Features of the security appliance from Network Box; Information on the spam...

  • Beijing scores No. 1 spot for malware.  // Enterprise Innovation;Aug/Sep2007, Vol. 3 Issue 4, p8 

    The article reports that Beijing, China, has kept the number one spot in producing malicious software (malware). According to Simon Herod, managing director for security vendor Network Box Corp., 40% of malware worldwide originated from Beijing in June and doubled from 21% in May. Beijing was...

  • Is a personal firewall right for your computer? Altom, Tim // Indianapolis Business Journal;10/7/2002, Vol. 23 Issue 30, p54A 

    Discusses the use of firewall software in home computers to prevent virus attacks. Availability of personal firewalls for comparatively little money; Ways in which firewalls are not altogether effective; Certain personal firewalls' focus on barring determined incoming attacks; Prevention of...

  • Tracking products help find lost and stolen notebooks. Santoni, Andy // InfoWorld;12/08/97, Vol. 19 Issue 49, p36 

    Highlights the tools that are being developed by software suppliers to help information technology (IT) managers keep track the kind of software is installed on clients and to find a client even if it is stolen. Key features and advantages of CompuTrace Onlined Monitoring Service from Absolute...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics