sonicwall - News, Features, and Slideshows


  • Dell unveils BYOD-focused mobility product plans

    Dell today unveiled enterprise mobility software for Google Android or Apple iOS that supports employee "bring your own device" use by selectively applying VPN controls only to the corporate apps on the device, not the employee's personal apps.

    Written by Ellen Messmer01 April 14 16:49
  • Dell: We can beat Cisco in enterprise and Cloud security

    Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM.

    Written by Ellen Messmer20 Feb. 13 18:01
  • What's lurking in your network? Find out by decrypting SSL

    Organizations have spent vast sums of money on security systems and, when deployed and operated correctly, they play a key role in safeguarding the organization. However, most systems have one critical dependency: The traffic flowing through must be readable. If the traffic is encrypted, many systems are almost completely useless, giving the system owner a false sense of security.

    Written by Brian Heder18 Jan. 13 17:15
  • NSW Institute of Sport casts IP camera eye on swimmers

    A swimmer takes to the pool in Sydney’s Aquatic Centre. As he or she glides through the water, four IP cameras installed in the roof capture body movements and times — vital information when preparing for the Olympic Games where even a split second can mean the difference between winning gold or silver.

    Written by Hamish Barwick10 Dec. 12 09:13
  • Fortinet unhappy with tests showing firewall flaw

    Security vendor Fortinet has hit back against tests by NSS Labs that showed one of its high-end firewalls along with products from other vendors could be hacked using a 'TCP split handshake attack'.

    Written by John E Dunn14 April 11 01:19
  • Researchers aim for cheap peer-to-peer zero-day worm defense

    Shutting down computer attacks could be carried out inexpensively by peer-to-peer software that shares information about anomalous behavior, say researchers at the University of California at Davis.

    Written by Tim Greene14 Jan. 09 12:10