IT Security


Ohio Sheriff’s Office Uses Biometrics-Based Identity/Access Management System

BIO-key International Inc. and its partner Sig-Tec recently announced the successful deployment of a fingerprint biometrics-based identity and access management system at the Mahoning County (Ohio) Sheriff's Office.

Frankfurt Airport Uses Novell Identity Manager To Improve Security, Efficiency

The operator of the world's eighth largest airport and Germany's largest employer, Fraport AG, has implemented Novell identity and security management solutions to achieve a single point of control for thousands of identities and secure IT resources at Frankfurt Airport.

Leaving Your Mark

Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.

Survey: Businesses Perceive Cybercrime As Major Risk

Finjan Inc., a provider of secure Web gateway solutions for the enterprise market, recentlyannounced the findings of its Web security survey of 1387 IT/security professionals.

Study: IT Security Spending Will Continue To Increase In 2009

Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research Inc. on the first day of its Security Forum.

Survey: 52 Percent Of Organizations Only Require Passwords To Access Critical Data

Quest Software Inc. recently announced the results from an Aberdeen Group benchmark study, "Strong User Authentication," which shows that 52 percent of organizations require only passwords for employees to access critical data, rather than augmenting passwords with stronger forms of authentication such as hardware tokens, digital certificates or risk-based scoring.

Study: Most Organizations Lack Controls To Stop Interior Network Threats

Mirage Networks recently announced results from a new study that revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge.

Georgia Hospital Deploys Strong Authentication Solution For Remote Access

To comply with HIPAA regulations, the Georgia-based Gwinnett Medical Center already was leveraging two-factor authentication via hardware tokens in order to protect patient files, sensitive medical data and clinical information.



Report: Enterprises Increasingly Targeted Through Malicious Web Content, Blended Security Attacks

Secure Computing Corp. recently published the company’s Q2 Internet Threat Report containing data and analysis from the Secure Computing research team.

Fidelis Security Systems Wins Frost & Sullivan 2008 Growth Excellence Of The Year Award in Infrastructure Protection

Fidelis Security Systems, a producer of data leakage prevention (DLP) solutions recently announced that Frost & Sullivan, the Growth Partnership Company, has named the Fidelis Extrusion Prevention System, Fidelis XPS, winner of the 2008 Growth Excellence of the Year Award in Infrastructure Protection.

Researchers Take Antivirus Protection To The Cloud

Antivirus software on your personal computer could become a thing of the past thanks to a new "cloud computing" approach to malicious software detection developed at the University of Michigan.

Survey: 89 Percent Of IT Security Incidents Went Unreported In 2007

RSA Conference recently released the results of its recent survey of security professionals regarding the critical industry and infrastructure issues they currently face.

Study Tackles Employees' Criminal Misuse Of Stolen Identities

ID Analytics Inc. recently released the results of its internal data theft study which provides an analysis of the criminal behavior patterns associated with the misuse of identities stolen from the workplace by employees. The study's findings also provide a better understanding of the harm resulting from an internal versus external data breach.

The Hard Way

Almost every day, a report of lost, stolen or missing notebook PCs and hard drives or of related data breaches shocks the global community, including those people whose data has been compromised. Protection of data on individual systems and drives, as well as in data centers, has become a necessity for corporations, universities, government agencies and other organizations.

Forging New Frontiers

The biggest trends in the security industry today reflect those of business in general.

Pharmacy Benefit Managers Use Biometric Software For Improved Security

IdentiPHI Inc. recently announced one of the nation’s leading pharmacy benefit managers has selected IdentiPHI SAFsolution 5 Enterprise Edition to boost biometric authentication and security access across its network.

North Carolina State Ports Authority Uses Mi5 Platform To Protect Network

Mi5 Networks recently announced that the North Carolina State Ports Authority has deployed the Mi5 Webgate platform to defend its network and prevent access to unauthorized Web sites.

Model Assigns Probable Risk Of Attack To Computer Networks

To help managers safeguard valuable information most efficiently, computer scientists at the National Institute of Standards and Technology (NIST) are applying security metrics to computer network pathways to assign a probable risk of attack to guide IT managers in securing their networks.

Study: More Than 75 Percent Of Banking Web Sites Have Flaw That Could Make Customers Vulnerable

More than 75 percent of the bank Web sites surveyed in a University of Michigan study had at least one design flaw that could make customers vulnerable to cyber thieves after their money or even their identity.

Study: Open Source Software Exposing Companies To Security Risk

Fortify Software Inc. recently released its Open Source Security Study which reveals that the most widely-used open source software packages for the enterprise are exposing users to significant and unnecessary business risk.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3