IT Security


Bosch Will Provide Turnkey Security Installation to Hamburg-Moorburg Plant

Bosch Security Systems will provide communications and security technology to a Hamburg-Moorburg coal-fired power plant run by Vattenfall Europe Generation AG & Co. KG. The contract includes everything from public address systems to alarm signaling and evacuation, as well as fire detection technology, video surveillance, and communication and low-voltage networks for dual-unit plants.

University of Manchester Chooses StealthWatch to Improve Network Management

Lancope, Inc., the provider of the StealthWatch system, today announced that The University of Manchester has chosen the StealthWatch to monitor network behavior, detect network incidents and identify affected machines and users. NetFlow-based StealthWatch reduces total network and security management costs for The University of Manchester.

Research: 1.9 Million Malware-Infected Computers Controlled By Cybercriminals

Finjan Inc. recently announced that Finjan's Malicious Code Research Center (MCRC) has discovered a network of 1.9 million malware-infected computers. Corporate, government and consumer computers around the world were infected by the malware.

Trend Micro Broadens Endpoint Security Platform

Trend Micro is now offering a Power Management Module that allows enterprises to easily manage endpoints and reduce energy costs.

Survey: IT Security Budgets, Personnel Cuts Leveling Off

More than 70 percent of 1,500 U.S.-based information security professionals responding to a survey say their budgets were reduced the past six months due to the economic downturn, while 55 percent said they did not expect any additional cuts for the remainder of the year.

Economic Crisis Causing Increased Worldwide Consumer Fears About Fraud, Security Risks According To Research

Two-thirds of consumers around the world believe that the current economic crisis has impacted their personal risk for ID theft or fraud, according to research conducted in February and March by Unisys Corp.

Canadian Police Force Uses Two-Factor Authentication Solution For Added Network Security

Regulatory compliance is one of the driving forces behind many security integration decisions, forcing companies to consider solutions otherwise deemed unnecessary. Often, this results in organizations choosing the most basic product that meets the requirements with the least impact on processes and technology infrastructure. However, some organizations are choosing to integrate security technology that does more than merely comply with regulations — leading to enhanced business processes, cost cutting and increased efficiency.

Survey: Unauthorized Access To Patient Data Is Top Healthcare IT Security Concern In 2009

Imprivata Inc. recently announced the results of its second annual national survey, examining Identity Management Trends in Healthcare 2009. The online survey of IT decision makers in the healthcare field highlights some significant trends surrounding security, electronic health records (EHRs), virtualization, healthcare access management and the impact of the global recession on IT budgets, planning and priorities.



Siemens to Incorporate G&D StarSign USB Tokens

Giesecke & Devrient (G&D) is supplying Siemens Enterprise Communications (SEN) with smart cards and cryptographic USB tokens from the StarSign product family. The two companies intend to offer their customers jointly-developed company ID and identity solutions in a global cooperation model that would take effect immediately.

Healthcare Organizations Turning To Strong Authentication, Access Management Solutions

Imprivata Inc. and CDW Healthcare recently announced they are seeing a further escalating demand for the OneSign Authentication and Access Management Platform within the healthcare market.

HID Global Demonstrates Variety Of Secure Identity Solutions

HID Global will demonstrate a broad variety of solutions at ISC West. Under the theme “A World of New Possibilities,” HID’s booth (11052) shows a complete suite of products, resources and partnerships that enable end-users to conveniently implement everything from networked access control to contactless logical access solutions.

Extended Outlook

The Long Beach, Calif., police department turned to high-tech "eyes in the sky" to monitor and protect public access areas.

In a Blur

The security industry has been undergoing a series of advancements in low-light surveillance. Nonetheless, image quality in these situations does not compare to the quality of daytime surveillance.

Colleges Select Network Security Appliances To Stop Malware-Related Data Breaches

FireEye Inc. recently announced that San Francisco State University, Santa Barbara City College and Connecticut College have deployed FireEye appliances to preemptively stop data breaches caused by malware that steals student identity data, misappropriates faculty research, and exploits campus computing resources.

Indiana Schools Deploy McAfee Network Security Solutions

McAfee Inc. recently announced that School City of Hammond in Indiana has deployed McAfee’s network security solutions to secure the district’s elementary, middle and high schools from cybercrime.

Report: Credit Crunch Fuels Surge In Web Attacks

ScanSafe, a leading provider of SaaS Web Security, recently issued its Annual Global Threat Report.

Zions Bancorporation Uses SSL Certificate Services From Entrust

Zions Bancorporation, a multibillion dollar U.S. financial institution, anticipates it could save hundreds of thousands of dollars by purchasing SSL certificate services from Entrust Inc.

Lack Of End User Training Growing Threat To IT Security, According To CompTIA Study

While information security remains a top priority for eight in 10 IT professionals surveyed, many companies seem to be underestimating one of the most significant IT security threats -- end user error.

Study: Increased Use Of Wireless Networks Demands More Stringent Security Measures

The increase in mobile broadband services and the advent of new wireless technologies will increase the number of mobile workers who carry their business data on laptops and smart phones. New analysis from Frost & Sullivan, Innovations in Wireless Network Security, finds that enhanced security for wireless networks is vital to improve user experience.

NIST Updates Guide On Teleworking Data Security

Telecommuting has freed many to work far from the confines of the office via laptop, but the price of working while sipping a latte at that sunny café is the danger that a public network will not keep the data that passes through it safe. Now, to combat the risk inherent in remote access, the National Institute of Standards and Technology (NIST) has updated its guide on maintaining data security while teleworking.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3