IT Security Hot Topic At RSA 2008

Despite the blustery cold and windy weather in San Francisco on Wednesday, information security of all kinds is the hot topic at RSA 2008  -- the largest event in the world dedicated to the field.

At a breakfast roundtable, SanDisk released a survey that helps bring home the fact that oftentimes a big security issue is not protecting from shadowy hackers but from the cubicle dweller with an unsecured flash drive. According to the survey, 77 percent of corporate end users have used personal USB flash drives to transport data. But only 50 percent of end users believe their coworkers are doing the same thing.

And what’s on those drives is bothersome. Twenty-six percent of users admitted transferring customer information, while financial data was transported by 15 percent of respondents.

I then sat down with Solera Networks, who announced its Solera V2P Tap, expanding the company’s initiative toward enabling complete network visibility. The free solution is targeting organizations with virtual machine investments in network management and security tools by regenerating virtual network traffic, including intra-server virtual machine network traffic, to existing physical security infrastructure to monitor and protect virtual network activity.

Steve Shillingford described the solution as TiVo for the network that reviews every channel at all times.

“Having comprehensive network visibility is key to maintaining a secure network,” Shillingford said. “Most organizations have invested significantly in their security and monitoring tools. Purchasing the same tools for their virtual environment is expensive and redundant. Having the only virtual appliance for capture and storage allowed us to offer this solution free of charge to organizations not interested in redundant expenses.”

James Collinge and Roark Pollock from TippingPoint talked to me about the company’s Intrusion Prevention System. With bad press from high-profile data leakage appearing increasingly often in the media, the officials said IPS technology is being deployed in other parts of the network, including the data center.

What is great about the TippingPoint’s product is that beyond looking at where sensitive data -- like credit card and Social Security numbers -- flows inside the network, it can track down anything leaving the network. The information is then given to the company so it can be determined whether the movement of information was authorized.

“People are not really sticking their heads in the sand when it comes to security,” Pollock said. “People are getting more sophisticated about security and IPS technology.”

Watch the podcast section of the Security Products online site -- we’ll be posting two podcasts from RSA with Gemalto and Seagate, IBM and LSI soon.

And courtesy of the airline overlords, my RSA stay has been extended by a day. Hopefully I can fit in some of the companies I was originally unable to meet with and stop by some of the keynotes and education sessions.

About the Author

Brent Dirks is senior editor for Security Today and Campus Security Today magazines.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3