IT Security


Lockheed Martin to Provide Idaho Falls Power Utility Cybersecurity Services

Lockheed Martin is responsible for assessing the Idaho Falls Power AMI network architecture to perform a risk assessment, identify security requirements, and provide recommendations for design elements and controls to mitigate vulnerabilities. Once the network is in place, the team will perform penetration testing and establish operational controls for the operations and maintenance of the systems.

Wireless Solutions Provider Rajant Taps Scott Shirer to Oversee Customer Support Team

Rajant Corporation, which provides kinetic mesh networks and pervasive, multi-frequency wireless solutions, has announced the addition of Scott Shirer to oversee the company’s newly created customer support team.

Imperva Achieves Record Growth in 2010

Imperva announced that it achieved record growth at the close of fiscal year 2010, experiencing a 43 percent increase in revenue over 2009 and marking Q4 2010 as the largest quarter on company record.

NetWitness Expands Offerings to Support Cloud and Virtualized IT Service Models

Released to meet expanding operational use cases for cloud-based services and transformational virtual data center architectures, this addition to the NetWitness network monitoring platform provides unparalleled deployment flexibility and scalability across all operating environments.

Lunarline and SAC Partner to Create Near-Real-Time Continuous Monitoring

The two companies have to extended Lunarline's enterprise compliance manager to meet federal guidelines for "near real time" monitoring and new FISMA reporting guidelines outlined in OMB Memorandum M-10-15.

Aon Appoints Shawn Ram to Technology Practice Helm

Most recently an account executive and the San Francisco Bay area Technology Practice leader, Ram has worked with many clients in Silicon Valley and across the country for more than 10 years to deliver risk advisory services.

Mcafee Looks Back On A Decade Of Cybercrime

For Internet users, it has been a decade of exciting online advances that allow people to communicate, share information and conduct business in ways that were never before possible. However, cybercrime has also flourished over the last decade, growing by double digits year after year, and costing consumers hundreds of millions of dollars every year. The latest

CloudPassage Unveils Halo SVM and Halo Firewall for Elastic Cloud Environments

The products automate the three most fundamental practices for securing servers in public and hybrid clouds.



Eric D. Harris Named Managing Director for Stroz Friedberg's Dallas Office

In his new position, Harris supervises digital forensics, cybercrime investigations and e-discovery in criminal, civil, regulatory and internal corporate matters.

Imperva Develops Cloud Service Provider Certification

Data security company Imperva announced its PartnerSphere Cloud Alliance program, designed to enable managed security service providers, hosting providers and cloud providers to deliver data security for their cloud data centers.

WatchGuard Releases Update for E-mail Security Solutions

WatchGuard Technologies, a provider of business security solutions, released an anti-spam update to its extensible content security line of e-mail and Web content security appliances.

CSI Hires Steve DuPerrieu as Director of Product Marketing

DuPerrieu will directly supervise CSI's product managers responsible for Internet banking, document imaging, fraud-related services, print services, loan analytics and business intelligence software.

Former Netscape Executives Join Symplified's Advisory Board

Internet technology luminaries and former Netscape executives Taher Elgamal and Todd Rulon-Miller have joined its advisory board.

Crossbeam Appoints New Country Manager in China

Based in Beijing, Bi will be responsible for heading up Crossbeam’s sales and partner operations, helping expand the company’s presence throughout the country and drive demand for its line of X-Series security platforms.

National Program Office Planned For Online Trusted Identity Strategy

At a January 7 forum with Silicon Valley business and academic leaders at Stanford University, U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard Schmidt announced plans to create a National Program Office to help foster an environment in which sensitive online transactions can be carried out with greater levels of trust.

Webroot Offers Channel Partners Email Security Management

The Email Security Service simplifies user management by allowing administrators to add or edit users individually or in bulk fire uploads.

IT Storage Veteran Joins Pivot3 as Sales VP

Wittich, who has a proven track record of driving growth in a variety of corporate environments, immediately assumes the role and reports directly to Pivot3 President and CEO Bob Fernander. In his new position, Wittich is responsible for overseeing sales efforts in the Americas on behalf of Pivot3.

Crossbeam Supplies Network Platform to Telecommunications Carriers

The company says leading mobile operators and service providers rely on its security infrastructure that manages growing traffic volume.

Jeff Miller

IBM DataPower Executive Joins Layer 7 Management Team

At Layer 7, Miller will play a pivotal role in continuing the company’s aggressive growth, designing go-to-market strategies for new technologies and expanding the company’s product offerings in new and existing markets.

Survey: Security Concerns Increasing SMBs Awareness Of Private Cloud Computing Options

Techaisle's SMB survey across U.S., UK, Germany and Brazil shows that among SMBs, awareness of private clouds is 62 percent, highest as compared to public and hybrid clouds. However, given a choice, 44 percent of SMBs prefer to use public clouds as opposed to private and hybrid clouds.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3