A new security appliance that collects, stores and correlates large volumes of log information was unveiled by Network Intelligence Inc. at last month’s InfoSecurity 2002 show in New York City. The new device, called LogSmart, is a 2U-high (3.5 inches) rack-mountable appliance that collects security information from other network devices such as firewalls, intrusion detection systems, routers and application servers. LogSmart can collect information from up to 3,000 separate devices and capture logged events from source devices at a rate of more than 30,000 events per second (eps), according to Network Intelligence. The product is available now.

NetScreen embraces SSL with SafeWeb pact

NetScreen Technologies Inc. is joining other IP Security VPN vendors that recognize customers want a simpler, less-expensive, secure remote-access method to supplement their VPNs. The company is teaming up with SafeWeb Inc. to provide a Secure Sockets Layer-based remote-access alternative that requires no additional SSL client software on remote machines. That is because SafeWeb’s Secure Extranet Appliance (SEA) Tsunami gear uses SSL technology already embedded in Web browsers. Other makers of VPN gateways, such as Nortel Networks Corp., already have made provisions to include these simpler remote-access alternatives that operate at the application layer rather than the network layer.

Vernier aims to boost WLAN security

Vernier Networks Inc. has released an updated version of its wireless LAN management software and launched a new range of wireless controllers. Both sets of products are aimed at boosting security and simplify administration of enterprise WLANs. Version 3.0 of the Vernier Networks System software adds: Virtual LAN tagging, based on IEEE 802.1q, to create a wireless VLAN based on user ID, group affiliation, or location; Internet Group Management Protocol, which lets a data stream send the same information to several wireless users or groups at the same time; Programmable access control, which lets net managers apply security policies based on several criteria.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now