Channel Marker


June 4, 2007  4:24 PM

Firewall management vendor announces global channel partner program

Brein Matturro Profile: Brein Matturro

Resellers whose enterprise customers have large distributed management infrastructures may be interested in Tufin Technologies’ new worldwide channel partner program.

Ramat Gan, Isreal-based Tufin Technologies offers SecureTrack, a firewall management device that helps organizations manage rulesets, troubleshoot misconfigurations, audit corporate policies and more via a Web interface.

According to Chris Clements, security architect for Nashville, Tennessee-based Flat Earth Networking, SecureTrack provides a window to see firewall data coherently. Flat Earth Networking is packaging its sales of Check Point firewalls with SecureTrack.

“Our large customers must efficiently and consistently match corporate policies  with firewall changes, and we see Tufin’s SecureTrack firewall operations management solution as the clear choice for optimizing and auditing firewall policies,” said Dave Wilson, Flat Earth’s South Eastern regional director.

SecureTrack supports Check Point, Cisco and Juniper firewalls.

According to a press release, Tufin has more than 24 channel partners spanning 27 countries. The new global channel partner program marks the company’s official entry into the U.S. market. The partner program offers full sales and technical training, beta program access, direct Tufin support, an online partner center and more.

June 4, 2007  3:51 PM

Oracle updates lawsuit against SAP

Yuval Shavit Profile: YuvalShavit

Oracle amended its lawsuit against SAP today to include allegations of copyright infringement and breach of contract.

The suit still lists 50 “Doe” defendants, which Oracle will try to identify during the discovery phase of the suit. Oracle suing SAP could be trouble for resellers and systems integrators, experts said, if they used materials which are deemed to have been illegally taken from Oracle.

Oracle would not comment further about the suit. SAP wrote in a press release that it is “eager to vigorously defend” the allegations, but could not be reached for further comment.


June 4, 2007  7:35 AM

Channel news: iPhone to launch June 29; EMC buys authentication

Brein Matturro Profile: Brein Matturro

Apple to launch IPhone on June 29 Apple Inc.’s highly anticipated iPhone will be available June 29, according to both TV commercials broadcast Sunday night and a company spokesman. [AP]

EMC buys authentication service provider Verid Verid’s service searches public records for difficult-to-answer questions that can be used to establish the identity of a user. [Computerworld]

VeriSign, AirMagnet team up for wireless IPS Gartner IT Security Summit: VeriSign and AirMagnet announce collaboration on the new VeriSign Wireless Intrusion Prevention Service (IPS) to help IT shops defend Wi-Fi users.
[SearchSecurity.com] Continued »


June 1, 2007  12:20 PM

Endpoint security: As easy as flipping a switch?

Bcournoyer Brendan Cournoyer Profile: Bcournoyer

Most efforts to improve endpoint security focus on corporate policy enforcement, intrusion prevention systems and network access control software. But now one vendor is taking a different approach.

ConSentry Networks of Milpitas, Calif. wants to address the problem through network switching. The company calls its new technology “secure switching” and says its 24-port gigabit Ethernet platform can provide endpoint security as well as application-level, user-based controls.

ConSentry is taking the switching approach because most LANs are have no built-in control, said Michelle McLean, the vendor’s marketing director. The rationale is that any security technology will not be as effective as it could be if its network infrastructure has no built-in security component.

The switching platform, demonstrated at last month’s Interop conference in
Las Vegas, is called LANSheild CS-4024. It will be available in late summer with a $5,995 price tag.

Colin Steele


June 1, 2007  7:02 AM

Channel news: Dell lays off 8,000; Symantec nears vPro security; GPL3 released

Brein Matturro Profile: Brein Matturro

Dell lays off 8,000; 1Q earnings sag Dell Inc. beat Wall Street predictions in its first-quarter earnings report but said it would eliminate 10% of its work force over the next year as part of a plan to trim costs and become more competitive with rivals. [AP]

Symantec moves closer to delivering vPro security The Symantec Virtual Security Solution will work within virtual partitions to monitor network traffic and protect against attacks without interfering with the PC’s operating system. [eWEEK]

FSF releases fourth and final draft of GPLv3 “The most notable changes found in this latest draft include making GPLv3 compatible with version 2.0 of the Apache license, ensuring that distributors who make discriminatory patent deals after March 28 may not convey software under GPLv3, adding terms to clarify how users can contract for private modification of free software or for a data center to run it for them, and replacing the previous reference to a U.S. consumer protection statute.” [Slashdot] Continued »


May 31, 2007  2:46 PM

Pay up for security certifications, down for all other technology certificates

Bcournoyer Brendan Cournoyer Profile: Bcournoyer

Here’s some good news if you’re a certified security pro: You’re in the only group of certified IT professionals whose pay scale has gone up this year, Tekrati reports.

A new study by Foote Partners shows that pay for 27 certified IT skills has fallen 2.1% in the past six months. The only one of those 27 areas that has seen an increase is security, where pay is up 1.7%. Meanwhile, pay for non-certified skills has increased by 4.1%.

Edmond Baydian, chief operating officer for Juma Technology in Farmingdale, N.Y., said a survey of his company’s clients shows similar results. He attributes the trend to consolidation among businesses, which places more value on skills in a wide range of areas. Unlike in most IT fields, accreditation in security signifies that you have that broad knowledge, he said.

“Security gives you this application-layer view, and it’s less concerned about the underlying plumbing,” he said. “Security means that you understand the value of multiple protocols over IP.”

The “utmost importance” of security also plays a role, but that is changing because businesses and organizations are starting to turn their IT concerns to other areas, Baydian said. The next big trend will depend on where the government decides to focus new regulations — possibly in Voice over IP (VoIP), thanks to the Communications Assistance for Law Enforcement Act (CALEA), Baydian said.


May 31, 2007  12:21 PM

Super spammer Soloway canned

Brein Matturro Profile: Brein Matturro

The Associated Press is reporting this morning that Robert Alan Soloway, infamous spammer, was arrested yesterday by authorities in Seattle. Soloway is accused of hijacking unwitting victims’ computers, turning them into “zombies” and then using those computers to send out millions of spam emails.

Last week, the AP says, a federal grand jury returned a 35-count indictment, charging Soloway with mail fraud, wire fraud, email fraud, aggravated identity theft and money laundering.

This is not the first time that Soloway has found himself in court over his spamming practices. In 2005, Microsoft won a $7 million judgment against him and Robert Braver, owner of an Oklahoma-based ISP, won a $10 million civil judgment.

According to the SearchSecurity.com, authorities believe that Internet users could see a noticeable decrease in the amount of junk email they find in their inboxes and spam folders as a result of this arrest.

Though this is all good news for value-added resellers and security consultants who defend their customers’ networks from spammers like Soloway, that last bit seems a tad overly optimistic. There are many many people out there who will eagerly fill Soloway’s shoes in his absence (maximum sentence, if convicted, being 65 years in a federal prison).

Security consultants aren’t expected to loosen their email security strategies. Antispam standards and email security products have not been made obsolete by this one arrest. Unfortunately, Soloway is just one in an entire culture of spammers who exploit the networks of small and midsized businesses to earn an easy buck. VARs still need to keep their strategies fresh and up-to-date.

That said, it’s nice to know that Soloway won’t be enjoying the nice cars he likes to brag about for a long time.

~Eric Pierce


May 31, 2007  7:04 AM

Channel news: Jobs, Gates get jolly onstage; IM attacks rise 73%

Brein Matturro Profile: Brein Matturro

Jobs and Gates bury the hatchet Bill Gates and Steve Jobs, two of the greatest rivals in technology, made a rare joint appearance last night, but surprised followers of their bitter saga by showering each other with praise. [TimesOnline]

IM attacks so far increased 73% over 2006 Security researchers at Akonix have uncovered 170 malware attacks over IM this year. [eWEEK]

Five reasons to prepare — now — for more mobile security threats So far, mobile security threats have been rare and have been more annoying than dangerous. That’s changing rapidly, a security expert says. [Computerworld] Continued »


May 30, 2007  1:47 PM

Google reaches for an application security blanket

Brein Matturro Profile: Brein Matturro

While Google is in the news after coming under antitrust scrutiny from the U.S. Justice Department due to its planned purchase of online advertising juggernaut DoubleClick, its purchase of GreenBorder attracted, well, a bit less attention.One of the worst-kept secrets at Google is its ambitious plans for its online application suite, which has been bolstered in recent years by purchases of services such as Writely (a word processor) and JotSpot (a WYSIWYG wiki). But concerns about data security, spyware and computer viruses continue to bedevil their efforts — at least from a public relations standpoint.

As the unofficial Google Operating System blog notes, GreenBorder creates a mini VPN session for each Internet session, therefore bulletproofing it from computer viruses, spyware and malware. The protected Web-based applications are displayed in a browser window surrounded (you guessed it) by a green border. When the session is over, users close the GreenBorder VPN session, and all cached information is removed. VARs will be able to respond to this ever-changing application security landscape by continuing to offer network security beyond the green border.

It’s not difficult to see why Google would buy GreenBorder. With GreenBorder now in the company’s software stables, Google can make a stronger case that the sensitive data contained within its online application suite is safe from cyber scoundrels. Google is betting that, with a little help from friends such as GreenBorder, it has solved the problem of network security for those who see online applications as the wave of the future.

Googlified notes that

Andrew Garcia called it “a novel approach to combating Microsoft Corp. Outlook- or Internet Explorer-borne malware.” And according to KeyLabs (now part of AppLabs), “GreenBorder was broader than and superior to that afforded by traditional anti-spyware and antivirus packages.”

Marketing bluster aside, the tie-up between Google and GreenMarket doesn’t deliver a death blow for Symantec, Norton and other computer security firms, or for VARs that provide comprehensive network security solutions. At least not yet. After all, GreenBorder is a Web-based application that won’t impact corporate users of Office 2007 who rely on antivirus software, spam filters and similar tools that protect their corporate data networks.

Matt Donnelly


May 30, 2007  7:21 AM

Channel news: CDW to go private; Mac Office users face compatibility gaps

Brein Matturro Profile: Brein Matturro

Equity firm to acquire CDW Madison Dearborn Partners will acquire the CDW Corporation, a leading online computer reseller, for $7.3 billion. [NYT]

Mac users face hurdles with new Office versions Companies that use Microsoft Office on both Macintosh and Windows PCs will have to deal with cross-platform compatibility issues with the new Office 2008 productivity suite. [eWEEK]

Vulnerabilities in Cisco IOS processing SSL packets Cisco IOS devices may crash while processing malformed Secure Sockets Layer (SSL) packets. In order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL protocol exchange with the vulnerable device. [Cisco] Continued »


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: