Juniper’s relationship with Packet Design

In Newsletter 26 October, we noted that the most common rumor we heard was, was acquired by Juniper Riverbed would. In this issue, we find that for a number of reasons, we do not assume that Juniper would Riverbed. We explained, for example, to sell in the service, but certainly not Riverbed is first a rapid business-focused companies. In contrast, DNA Juniper clearly in the market for service providers.

Part of the agreement, Juniper announced that with Packet Design is the kind of partnership with OEM direct sales Juniper Packet Design Route Analytics does not sell products. announced as part of its announcement, as well as Juniper, they offer a platform for spatial development called Juno. Packet Design Route Analyzer product is one of the first solutions, which lives in the space of Juno.

Contrary to rumors of the acquisition of Riverbed, Juniper recently announced relationship with Packet Design is very much sense. This follows because Packet Design Route Analytics produces some of the challenges that occur in very large networks, targeted – both corporate and service provider.

Continue reading “Juniper’s relationship with Packet Design”

Fortinet settles GPL violation suit

Security specialist Fortinet has agreed to provide some source code available, following allegations that it infringed on the GPL, the company Tuesday.
Earlier this month, will gpl-violations.org founder Harald Welte an injunction against Fortinet, banning companies that distribute their products to them with the terms of the GPL. The GPL or GNU General Public License is used by developers for the products they want to remain freely available under license to other programmers in accordance with the ideals of free software movement.

Welte claimed that Fortinet had not only abused the code under GPL, but it also tries to hide the use of GPL code by using cryptographic techniques.

Continue reading “Fortinet settles GPL violation suit”

Malicious code hits record-high in Jan

The volume of different malware has increased to over 9,000 last month, more than twice higher than in December, the company said in a statement Wednesday. Headquartered in Sunnyvale, Calif., collects data from devices FortiGate network security and information located worldwide, and produces monthly statistics from data threats.

The top of the charts were variants of Bredolab a share of over 40 per cent of all malicious activity. The program Downloader Bredolab which took the No. 1 position since November 2009, was caused by attacks Gumblar said Fortinet.

Has also been highlighted in the report, was the wave of attacks known as Operation Aurora – a major issue number following the threat of Google last month to learn from China. Fortinet said that the attacks, which was used a zero-day vulnerability in Microsoft Internet Explorer browsers, 10 in January attack ranked No. 4 in the top list.

Continue reading “Malicious code hits record-high in Jan”

Mozilla discloses more Firefox flaws

Apple’s Safari browser, you have once Snow Leopard and the iPhone hacked during the first days of the annual competition Pwn2Own where security experts of the material they were able to gain the offensive. The CNet reports, security analyst Charlie Miller won $ 10,000 after it remotely Safari on a MacBook Pro.

The victory was both sweet and familiar to Miller, senior analyst of security used for Independent Security Evaluators, because he had managed to Safari to contest the 2009 and 2008 iterations. He holds the exact technique of the attack this year under wraps for now, but have simply pointed out that the target computer was to visit a specially crafted Web site enough to use the trigger, by providing access to online orders for the Mac. The promoter Pwn2Own, Tipping Point’s Zero Day Initiative, the exchange of information on exploits with participating manufacturers to provide them the opportunity to patch vulnerabilities.

The iPhone had been shot by Vincenzo Iozzo of Zynamics and Ralf Philipp Weinmann at the University of Luxembourg, which the prize money of $ 15,000 for the penetration divided into the unit. (Everyone must also be an award for unique names are difficult.)

The iPhone hack is started with a website with malicious code, before the attack inside “the database of the local SMS phone for the server we have control,” says Weinmann CNet.

Fortinet Fortimail 400B

Fortimail 400B is an appliance-based email security solution that helps secure email both at the protocol and content layers for inbound and outbound messaging. The appliance can be integrated into an existing SMTP architecture to protect one or more domains, or act as its own standalone server appliance.

Installation was very easy, we were up and running in minutes. The console itself is web-based and the configuration wizards made things easy for our testers. While most appliances in this category act as gateways for existing SMTP architectures, Fortimail can also be used as a standalone mail server, which is an excellent feature.

Continue reading “Fortinet Fortimail 400B”