IT Security


HID Announces Set Of Logical Access Control Solutions

HID Global recently announced the launch of HID on the Desktop, a powerful set of logical access control solutions that can extend the reach of an organization’s existing physical access infrastructure.

Raising the Bar

With every successful breach of Internet security, we learn the same lesson: there is no silver-bullet solution to prevent online fraud. Attackers are relentless innovators, single-minded in the pursuit of a breach. Security professionals have long understood that any single factor—like a password—can be spoofed. Even security tokens, considered by some to be 100 percent reliable, can in fact be passed around, phished, lost or stolen.

The Big Picture

For many businesses wanting to transition from analog to digital networks, the numbers seem daunting. Although they want to migrate to an IP video solution, can they afford to do so?

DNSSEC Deployment Coordination Initiative, DHS To Present Program

Focusing on deploying domain name system security extensions, "The Keys to Deploying Domain Name System Security Extensions (DNSSEC): Managing and Meeting Your OMB Domain Name System Requirements," will be presented by the DNSSEC Deployment Coordination Initiative, and supported by the Department of Homeland Security during GovSec and U.S. Law March 11-12

Report Predicts Strong Growth In Identity And Access Management Market

A new report from research firm RNCOS, “Identity and Access Management Market Forecast to 2012,” is forecasting strong growth for the identity and access management market.

Indiana Credit Union Deploys E-Mail Gateway Appliance

McAfee Inc. recently announced that Teachers Credit Union, the largest credit union in Indiana, has deployed McAfee E-mail Gateway appliance (formerly IronMail) to protect sensitive information and help eliminate viruses, spam and malware before it reaches users.

Report: 92 Percent Of Critical Microsoft Vulnerabilities Are Mitigated By Eliminating Administrator Rights

BeyondTrust Corp. recently published research findings stating that the removal of administrator rights from Windows users is a mitigating factor for the vast majority of all Microsoft software vulnerabilities reported by Microsoft in 2008.

Study Shows Data Breach Costs Continue To Rise

PGP Corp. and the Ponemon Institute recently announced results of the fourth annual U.S. Cost of a Data Breach Study. According to the study which examined 43 organizations across 17 different industry sectors, data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007.



Aviglion Named To 2009 'Ready To Rocket' List

Avigilon recently announced the company has been named to Rocket Builders’ 2009 “Ready to Rocket” list. Each year, based on analysis of trends that will drive growth in the information technology sector, Rocket Builders, a market strategy and consulting firm, identifies 25 private companies that are best positioned to capitalize on the trends for growth.

Study: Businesses Lose More Than $1 Trillion In Intellectual Property Due To Data Theft, Cybercrime

McAfee Inc. recently announced findings from the first global study on the security of information economies. In the study, Unsecured Economies: Protecting Vital Information, security experts and senior IT decision makers warned that the global recession is putting vital information at greater risk than ever before.

Analysis: Compliance Requirements Driving Healthcare Security Boom

Security vendors gradually built a strong presence in the healthcare industry after overcoming initial resistance from the medical community. Technological advances and increasing applications within healthcare favor supply side factors. With healthcare staff coming to terms with inevitable compliance standards and the healthcare industry poised to grow at double-digit rates, the market looks highly lucrative over the forecast period. New analysis from Frost & Sullivan finds that the market earned revenues of $1.66 billion in 2007 and estimates this to reach $5.78 billion in 2014.

Survey: Security Void Exists Around Microsoft SharePoint Infrastructure Of Some Companies

There appears to be a void in security around companies' Microsoft SharePoint infrastructure even though SharePoint usage is on the rise. This puts SharePoint servers and employee PCs at risk for data-stealing malware; outside customers, clients, partners, and remote employees who share the same collaboration platform also become vulnerable to the growing complexity of Web threats that can spread silently, but destructively.

Researchers Develop Effective, Low-Cost Defense Against Computer Worms

Thanks to an new strategy devised by researchers at the University of California, Davis, and Intel Corp., computer network administrators might soon be able to mount effective, low-cost defenses against self-propagating infectious programs known as worms.

UK Hospital System Deploys E-Mail Encryption

Voltage Security has announced that Lancashire Teaching Hospitals NHS Foundation Trust in the United Kingdom has deployed Voltage SecureMail to protect sensitive information that may be contained in e-mail messages.

Survey: IT Security Budgets Increasing In Financial, Government Sectors

In light of the economic downturn and rising cybercrime attacks, Finjan conducted an online survey among 200 IT and security professionals. The survey focused on determining the trends for allocating IT budgets in 2009 compared to 2008.

Survey Looks At Gaps In Web Security

Purewire Inc., a Web security SaaS vendor, recently announced end-user survey results illustrating severe vulnerabilities to corporate networks due to malware-infected Web applications, remote workers and shrinking IT budgets.

Report: Critical Infrastructure Prime Targets For Cyber Criminals In 2009

The year 2008 was a time security threats and malicious activity reached a tipping point, and 2009 stands to be the year critical infrastructure systems become prime targets for cyber criminals and the global financial crisis will be exploited for a variety of malicious activities, according to a new report recently released from VeriSign’s iDefense Security Intelligence Services.

Survey: 96 Percent Of Databases Export Sensitive Data To Other Systems

Independent research organization Unisphere Research and Vormetric, Inc., recently announced results of the Special Research Report: Data Security and Encryption, including that 96 percent of databases export sensitive data to other systems, including backups, file servers and application log files.

Forecast Looks At Top IT Security Issues In 2009

As 2008 -- a year in which a record number of data breaches occurred and over 22 million records were compromised -- comes to a close, Utimaco has unveiled the top economic, legislative and technical trends that it feels will drive the IT security market in 2009.

Survey: Downturn In Economy Leading To More Employees Downloading Sensitive Company Data

It would seem desperate times call for desperate measures, as a survey released recently shows that workers will do almost anything to keep their jobs -- but at a cost to the employer.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3