the Pipeline

Ladies and gentlemen, start your engines. Don't know what you've got until it's gone.

Ladies and gentlemen, start your engines

SingleClick Systems has announced the release of Wireless Network Ignition Version 2.0.

The product offers do-it-yourself wireless networking on the road, at home or in small offices. It lets users instantly secure their networks to minimize potential threats such as Internet spoofing and identity theft.

One new feature in the latest version is an improved encryption wizard that walks users through the steps for quickly locking down a wireless network. After lockdown, the product protects the network from unauthorized connections, and users remain connected to their trusted access points at all times.

The new version includes enhanced wireless profile features that make it easier for travelers to set up and configure wireless connections in airports and hotels.

The company has updated other features with this release, including automated wireless network detection, self-healing and diagnostics.

The automated-detection feature pinpoints the source of connectivity failures when you're installing or configuring your wireless network. The device, software or vendor may be responsible for failures, and the self-healing feature helps overcome them.

If the software is unable to repair a connection failure, it offers problem-solving instructions and suggestions.

Wireless Network Ignition 2.0 is available for download at www.single clicksystems.com for a suggested retail price of $39.95. The software is free for 30 days, and bulk-purchase pricing is available.

Don't know what you've got until it's gone

In a way, falling victim to data theft is like regretting something you said: Once it's out there, you can't take it back. That's why it's so important to prevent data theft.

Lumigent Technologies recently announced a suite of products that does just that. Lumigent's Information Security Management Suite features new and existing products that allow organizations to manage security and compliance risk to sensitive data.

The suite facilitates compliance with local, state, federal and international regulations, and industry-specific mandates related to the security, privacy, integrity and accuracy of information. It also deters theft through continuous auditing and database asset monitoring.

The suite comprises four products. The first, Audit DB 3.0, is database auditing software for ensuring the security and integrity of information.

The next package is a new product called Vulnerability Manager DB 3.0 that continuously assesses and manages the security of database and application environments. It offers several new capabilities, such as management of baseline change, context-based vulnerability and customized policy.

You can use it with database products from Oracle, Sybase and Microsoft SQL server. Vulnerability Manager DB 3.0 uses industry best practices and an organization's policy information to provide analysis of database and operating system vulnerabilities.

The other two products, Vulnerability Manager for Peoplesoft and Vulnerability Manager for Oracle 11i, also provide continuous assessment and management capabilities for those application environments.

The Lumigent Information Security Management suite starts at $10,500 for Microsoft Windows NT installations.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group