WEB SERVICES ARE primed to be the next big development for Internet-based applications and transactions. As with any new technology, security eventually surfaces in the discussion — and Web services ...
As organizations begin to plan next-generation, Internet-connected, Web services-enabled systems, they face the issue of how to manage security. In the past, this meant working with a few companies ...
DataPower Technology Inc. last week joined a small but growing number of IT vendors offering products aimed at securing XML-based Web services applications. The Cambridge, Mass.-based company’s XS40 ...
Microsoft this week is scheduled to plug a major gap in its perimeter security software by integrating a partner’s XML filtering and acceleration technology into its firewall and caching server. The ...
As I mentioned in previous columns, there’s a new set of draft documents from the Computer Security Resource Center (CSRC) of the U.S. National Institute of Standards and Technology (NIST). SP 800-95, ...
SANTA CLARA, Calif. & STOCKHOLM, Sweden & TULSA, Okla.--(BUSINESS WIRE)--Yubico, the leading provider of hardware authentication security keys, and Straxis, a mobile application provider, today ...
If the blizzard of specifications related to Web services security has left you snow blind, you have plenty of company. WS-Security, from Microsoft, IBM, and VeriSign, deals with the protection and ...
NEW YORK, Feb. 9, 2011 - Trusteer, the leading provider of secure web access services, today announced Trusteer Secure Web Access which enables organizations to protect their web applications, network ...
A secure, semantic-based interoperability framework for exploiting Web service platforms across peer-to-peer networks in the tourism industry hopes to set free the valuable Web-based tourism ...
These enterprise-grade, Chromium-based web browsers are designed for the security needs of the enterprise, not the consumer. Some now come as part of other security tools. Web browsers have long been ...