the Pipeline

Ladies and gentlemen, start your engines. Don't know what you've got until it's gone.

Ladies and gentlemen, start your engines

SingleClick Systems has announced the release of Wireless Network Ignition Version 2.0.

The product offers do-it-yourself wireless networking on the road, at home or in small offices. It lets users instantly secure their networks to minimize potential threats such as Internet spoofing and identity theft.

One new feature in the latest version is an improved encryption wizard that walks users through the steps for quickly locking down a wireless network. After lockdown, the product protects the network from unauthorized connections, and users remain connected to their trusted access points at all times.

The new version includes enhanced wireless profile features that make it easier for travelers to set up and configure wireless connections in airports and hotels.

The company has updated other features with this release, including automated wireless network detection, self-healing and diagnostics.

The automated-detection feature pinpoints the source of connectivity failures when you're installing or configuring your wireless network. The device, software or vendor may be responsible for failures, and the self-healing feature helps overcome them.

If the software is unable to repair a connection failure, it offers problem-solving instructions and suggestions.

Wireless Network Ignition 2.0 is available for download at www.single for a suggested retail price of $39.95. The software is free for 30 days, and bulk-purchase pricing is available.

Don't know what you've got until it's gone

In a way, falling victim to data theft is like regretting something you said: Once it's out there, you can't take it back. That's why it's so important to prevent data theft.

Lumigent Technologies recently announced a suite of products that does just that. Lumigent's Information Security Management Suite features new and existing products that allow organizations to manage security and compliance risk to sensitive data.

The suite facilitates compliance with local, state, federal and international regulations, and industry-specific mandates related to the security, privacy, integrity and accuracy of information. It also deters theft through continuous auditing and database asset monitoring.

The suite comprises four products. The first, Audit DB 3.0, is database auditing software for ensuring the security and integrity of information.

The next package is a new product called Vulnerability Manager DB 3.0 that continuously assesses and manages the security of database and application environments. It offers several new capabilities, such as management of baseline change, context-based vulnerability and customized policy.

You can use it with database products from Oracle, Sybase and Microsoft SQL server. Vulnerability Manager DB 3.0 uses industry best practices and an organization's policy information to provide analysis of database and operating system vulnerabilities.

The other two products, Vulnerability Manager for Peoplesoft and Vulnerability Manager for Oracle 11i, also provide continuous assessment and management capabilities for those application environments.

The Lumigent Information Security Management suite starts at $10,500 for Microsoft Windows NT installations.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group