Pivot3 Inc. has received the Red Herring 100 North America award, which honors the most promising private technology companies in North America.
Despite a renewed focus on governance and transparency, a recent survey from SailPoint Technologies revealed a disconnect between regulatory compliance and proactive risk management.
President Obama has proposed sweeping reform of the nation's healthcare system and said he believes all medical records should be computerized and standardized within five years. The President hopes this will result in increased quality of care, decreased costs, and creation of thousands of new jobs. Todd Feinman, a published security expert and CEO of Identity Finder , cautions, however, that electronic medical records add higher risk of identity theft unless they are carefully protected.
When you think of the most trusted and well respected consumer brands, names like Pampers, Tide, Always, Gillette, Bounty, Charmin, Downy, IAMS and Crest quickly come to mind. As the parent company for these and other brands, Procter & Gamble sets the standard for excellence in numerous areas. Much of what P&G does behind the scenes reflects its commitment to excellence as well.
- By Joe Arayas
- May 01, 2009
As U.S. car sales near a 27-year low, dealerships have a higher stake than ever in ensuring the safety of their inventory. Many are enhancing security procedures or developing new measures to prevent theft, deter vandalism and ensure the safety of their employees and inventory.
- By J. Matthew Ladd, John Lynch
- May 01, 2009
Bosch Security Systems will provide communications and security technology to a Hamburg-Moorburg coal-fired power plant run by Vattenfall Europe Generation AG & Co. KG. The contract includes everything from public address systems to alarm signaling and evacuation, as well as fire detection technology, video surveillance, and communication and low-voltage networks for dual-unit plants.
Lancope, Inc., the provider of the StealthWatch system, today announced that The University of Manchester has chosen the StealthWatch to monitor network behavior, detect network incidents and identify affected machines and users. NetFlow-based StealthWatch reduces total network and security management costs for The University of Manchester.
Finjan Inc. recently announced that Finjan's Malicious Code Research Center (MCRC) has discovered a network of 1.9 million malware-infected computers. Corporate, government and consumer computers around the world were infected by the malware.
Trend Micro is now offering a Power Management Module that allows enterprises to easily manage endpoints and reduce energy costs.
More than 70 percent of 1,500 U.S.-based information security professionals responding to a survey say their budgets were reduced the past six months due to the economic downturn, while 55 percent said they did not expect any additional cuts for the remainder of the year.
Two-thirds of consumers around the world believe that the current economic crisis has impacted their personal risk for ID theft or fraud, according to research conducted in February and March by Unisys Corp.
Regulatory compliance is one of the driving forces behind many security integration decisions, forcing companies to consider solutions otherwise deemed unnecessary. Often, this results in organizations choosing the most basic product that meets the requirements with the least impact on processes and technology infrastructure. However, some organizations are choosing to integrate security technology that does more than merely comply with regulations — leading to enhanced business processes, cost cutting and increased efficiency.
- By Chen Arbel
- Apr 17, 2009
Imprivata Inc. recently announced the results of its second annual national survey, examining Identity Management Trends in Healthcare 2009. The online survey of IT decision makers in the healthcare field highlights some significant trends surrounding security, electronic health records (EHRs), virtualization, healthcare access management and the impact of the global recession on IT budgets, planning and priorities.
Giesecke & Devrient (G&D) is supplying Siemens Enterprise Communications (SEN) with smart cards and cryptographic USB tokens from the StarSign product family. The two companies intend to offer their customers jointly-developed company ID and identity solutions in a global cooperation model that would take effect immediately.
Imprivata Inc. and CDW Healthcare recently announced they are seeing a further escalating demand for the OneSign Authentication and Access Management Platform within the healthcare market.
HID Global will demonstrate a broad variety of solutions at ISC West. Under the theme “A World of New Possibilities,” HID’s booth (11052) shows a complete suite of products, resources and partnerships that enable end-users to conveniently implement everything from networked access control to contactless logical access solutions.
The Long Beach, Calif., police department turned to high-tech "eyes in the sky" to monitor and protect public access areas.
- By Lee Caswell
- Apr 01, 2009
The security industry has been undergoing a series of advancements in low-light surveillance. Nonetheless, image quality in these situations does not compare to the quality of daytime surveillance.
- By Mike Capulli
- Apr 01, 2009
FireEye Inc. recently announced that San Francisco State University, Santa Barbara City College and Connecticut College have deployed FireEye appliances to preemptively stop data breaches caused by malware that steals student identity data, misappropriates faculty research, and exploits campus computing resources.
McAfee Inc. recently announced that School City of Hammond in Indiana has deployed McAfee’s network security solutions to secure the district’s elementary, middle and high schools from cybercrime.