IT Security


Pivot3 Wins Red Herring 100 North America Award

Pivot3 Inc. has received the Red Herring 100 North America award, which honors the most promising private technology companies in North America.

Survey: Majority Of Companies Lack Transparency Needed To Prevent Insider Threats

Despite a renewed focus on governance and transparency, a recent survey from SailPoint Technologies revealed a disconnect between regulatory compliance and proactive risk management.

Digital Health Records May Increase Identity Theft

President Obama has proposed sweeping reform of the nation's healthcare system and said he believes all medical records should be computerized and standardized within five years. The President hopes this will result in increased quality of care, decreased costs, and creation of thousands of new jobs. Todd Feinman, a published security expert and CEO of Identity Finder , cautions, however, that electronic medical records add higher risk of identity theft unless they are carefully protected.

Trust Your Integrator

When you think of the most trusted and well respected consumer brands, names like Pampers, Tide, Always, Gillette, Bounty, Charmin, Downy, IAMS and Crest quickly come to mind. As the parent company for these and other brands, Procter & Gamble sets the standard for excellence in numerous areas. Much of what P&G does behind the scenes reflects its commitment to excellence as well.

Ask the Expert

As U.S. car sales near a 27-year low, dealerships have a higher stake than ever in ensuring the safety of their inventory. Many are enhancing security procedures or developing new measures to prevent theft, deter vandalism and ensure the safety of their employees and inventory.

Bosch Will Provide Turnkey Security Installation to Hamburg-Moorburg Plant

Bosch Security Systems will provide communications and security technology to a Hamburg-Moorburg coal-fired power plant run by Vattenfall Europe Generation AG & Co. KG. The contract includes everything from public address systems to alarm signaling and evacuation, as well as fire detection technology, video surveillance, and communication and low-voltage networks for dual-unit plants.

University of Manchester Chooses StealthWatch to Improve Network Management

Lancope, Inc., the provider of the StealthWatch system, today announced that The University of Manchester has chosen the StealthWatch to monitor network behavior, detect network incidents and identify affected machines and users. NetFlow-based StealthWatch reduces total network and security management costs for The University of Manchester.

Research: 1.9 Million Malware-Infected Computers Controlled By Cybercriminals

Finjan Inc. recently announced that Finjan's Malicious Code Research Center (MCRC) has discovered a network of 1.9 million malware-infected computers. Corporate, government and consumer computers around the world were infected by the malware.



Trend Micro Broadens Endpoint Security Platform

Trend Micro is now offering a Power Management Module that allows enterprises to easily manage endpoints and reduce energy costs.

Survey: IT Security Budgets, Personnel Cuts Leveling Off

More than 70 percent of 1,500 U.S.-based information security professionals responding to a survey say their budgets were reduced the past six months due to the economic downturn, while 55 percent said they did not expect any additional cuts for the remainder of the year.

Economic Crisis Causing Increased Worldwide Consumer Fears About Fraud, Security Risks According To Research

Two-thirds of consumers around the world believe that the current economic crisis has impacted their personal risk for ID theft or fraud, according to research conducted in February and March by Unisys Corp.

Canadian Police Force Uses Two-Factor Authentication Solution For Added Network Security

Regulatory compliance is one of the driving forces behind many security integration decisions, forcing companies to consider solutions otherwise deemed unnecessary. Often, this results in organizations choosing the most basic product that meets the requirements with the least impact on processes and technology infrastructure. However, some organizations are choosing to integrate security technology that does more than merely comply with regulations — leading to enhanced business processes, cost cutting and increased efficiency.

Survey: Unauthorized Access To Patient Data Is Top Healthcare IT Security Concern In 2009

Imprivata Inc. recently announced the results of its second annual national survey, examining Identity Management Trends in Healthcare 2009. The online survey of IT decision makers in the healthcare field highlights some significant trends surrounding security, electronic health records (EHRs), virtualization, healthcare access management and the impact of the global recession on IT budgets, planning and priorities.

Siemens to Incorporate G&D StarSign USB Tokens

Giesecke & Devrient (G&D) is supplying Siemens Enterprise Communications (SEN) with smart cards and cryptographic USB tokens from the StarSign product family. The two companies intend to offer their customers jointly-developed company ID and identity solutions in a global cooperation model that would take effect immediately.

Healthcare Organizations Turning To Strong Authentication, Access Management Solutions

Imprivata Inc. and CDW Healthcare recently announced they are seeing a further escalating demand for the OneSign Authentication and Access Management Platform within the healthcare market.

HID Global Demonstrates Variety Of Secure Identity Solutions

HID Global will demonstrate a broad variety of solutions at ISC West. Under the theme “A World of New Possibilities,” HID’s booth (11052) shows a complete suite of products, resources and partnerships that enable end-users to conveniently implement everything from networked access control to contactless logical access solutions.

Extended Outlook

The Long Beach, Calif., police department turned to high-tech "eyes in the sky" to monitor and protect public access areas.

In a Blur

The security industry has been undergoing a series of advancements in low-light surveillance. Nonetheless, image quality in these situations does not compare to the quality of daytime surveillance.

Colleges Select Network Security Appliances To Stop Malware-Related Data Breaches

FireEye Inc. recently announced that San Francisco State University, Santa Barbara City College and Connecticut College have deployed FireEye appliances to preemptively stop data breaches caused by malware that steals student identity data, misappropriates faculty research, and exploits campus computing resources.

Indiana Schools Deploy McAfee Network Security Solutions

McAfee Inc. recently announced that School City of Hammond in Indiana has deployed McAfee’s network security solutions to secure the district’s elementary, middle and high schools from cybercrime.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3