The report, Risk and Compliance Outlook: 2011, commissioned by McAfee and conducted by Evalueserve, found that to address concerns about lack of IT protection, nearly half of all companies plan to spend an average of 21 percent more in 2011 on risk and compliance solutions.
As the security industry plows forward with new technology, products and ideas, there is the ever-present worry that some of the best available products will have to contend with knockoffs from China. It seems to happen in every industry, but maybe more so in the security market, to the chagrin of security manufacturers. During a conversation we had during ASIS 2010 with KJB Technologies President Jill Johnston, we wanted to know more.
With ISC West coming up on the docket, it will be interesting to see what video vendors will be emphasizing. Odds are that we will see scores of messages about better widgets -- higher-resolution cameras, unique VMS software, clever storage schemes and the like.
- By Mark S. Wilson
- Mar 01, 2011
They’ve always been the Achilles’ heel of video surveillance, whether analog or digital cameras are involved: those nasty shadows, glares, reflections and direct sunlight that turn captured images into darkness or wash them into a brilliant, undetectable white. Higher-resolution cameras simply exacerbate the problem.
- By John Monti, Mark S. Wilson
- Mar 01, 2011
Liberty University, the largest and fastest-growing Evangelical Christian university worldwide, has selected QRadar Security Intelligence Platform from Q1 Labs to manage the university’s increasing amount of security related data, while improving the detection of threats across the university network.
On the heels of Hong Tou Tou, two more spyware programs on Android devices have been discovered. Named "SW.SecurePhone" and "SW.Qieting," the spyware may cause serious privacy leaks.
The report will present voluntary best practices for reducing spam which, according to MAAWG, accounts for about 90 per cent of email traffic.
Key Source International has announced the SonarLocID, an integrated keyboard that addresses the most important aspect of workstation security: the logoff.
A study based on a survey of more than 10,000 information security professionals worldwide finds that a growing number of technologies that business are adopting widely are challenging information security executives and their staffs, potentially endangering the security of government agencies, corporations and consumers worldwide over the next several years.
The municipality of Egedal in Denmark has experienced a significant drop in crime since the implementation of a surveillance system based on Milestone XProtect Enterprise open platform video management software. The number of vandalism acts alone has fallen by 90 percent.
Kieth Ricketts will be responsible for all marketing activities across Becrypt’s worldwide operations. A major focus will be the continued development of Becrypt’s U.S. operation, as this market remains a key growth opportunity for the company.
Based on the same technology used by the U.S. Department of Defense, the apps accurately verify a user's identity using only his or her face through cloud-based facial search and retrieval applications.
Cisco has selected MorphoTrack (Safran group) as an ecosystem provider, making the company’s MorphoAccess biometric readers available as an integral component of Cisco’s IP-based access control system.
IndigoVision’s complete end-to-end IP video solution is behind a sophisticated monitoring system at a container terminal in the Port of Malaga, Spain.
Mobile Application Development (M.A.D.) Partners LLC and MainNerve are collaborating to provide iPhone, iPad and smartphone security and compliance to the critical healthcare sector.
Nelson is an advertising and marketing professional with a diverse background that includes experience in both the business-to-business (B2B) and business-to-consumer B2C realms.
Dell announced that it has closed its acquisition of SecureWorks Inc., a provider of information security services and expanding Dell’s IT-as-a-service offerings.
The program consists of a partnership of technology vendors committed to arming mutual customers with integrated solutions that fundamentally improve network security and risk management for enterprises.
MacCallum, who reports directly to Pivot3 CEO Bob Fernander, has more than 25 years of experience in information technology. As vice president of engineering, she will drive product strategy and development of the Pivot3 suite of storage appliances.
The main goal of the report is to support governmental bodies in taking informed, risk-based decisions regarding security of data, resilience of service and legal compliance on their way to the cloud. It also highlights security and resilience pros and cons of community, private and public cloud computing services for public bodies.