IT Security


Pivot3 Wins Red Herring 100 North America Award

Pivot3 Inc. has received the Red Herring 100 North America award, which honors the most promising private technology companies in North America.

Survey: Majority Of Companies Lack Transparency Needed To Prevent Insider Threats

Despite a renewed focus on governance and transparency, a recent survey from SailPoint Technologies revealed a disconnect between regulatory compliance and proactive risk management.

Digital Health Records May Increase Identity Theft

President Obama has proposed sweeping reform of the nation's healthcare system and said he believes all medical records should be computerized and standardized within five years. The President hopes this will result in increased quality of care, decreased costs, and creation of thousands of new jobs. Todd Feinman, a published security expert and CEO of Identity Finder , cautions, however, that electronic medical records add higher risk of identity theft unless they are carefully protected.

Trust Your Integrator

When you think of the most trusted and well respected consumer brands, names like Pampers, Tide, Always, Gillette, Bounty, Charmin, Downy, IAMS and Crest quickly come to mind. As the parent company for these and other brands, Procter & Gamble sets the standard for excellence in numerous areas. Much of what P&G does behind the scenes reflects its commitment to excellence as well.

Ask the Expert

As U.S. car sales near a 27-year low, dealerships have a higher stake than ever in ensuring the safety of their inventory. Many are enhancing security procedures or developing new measures to prevent theft, deter vandalism and ensure the safety of their employees and inventory.

Bosch Will Provide Turnkey Security Installation to Hamburg-Moorburg Plant

Bosch Security Systems will provide communications and security technology to a Hamburg-Moorburg coal-fired power plant run by Vattenfall Europe Generation AG & Co. KG. The contract includes everything from public address systems to alarm signaling and evacuation, as well as fire detection technology, video surveillance, and communication and low-voltage networks for dual-unit plants.

University of Manchester Chooses StealthWatch to Improve Network Management

Lancope, Inc., the provider of the StealthWatch system, today announced that The University of Manchester has chosen the StealthWatch to monitor network behavior, detect network incidents and identify affected machines and users. NetFlow-based StealthWatch reduces total network and security management costs for The University of Manchester.

Research: 1.9 Million Malware-Infected Computers Controlled By Cybercriminals

Finjan Inc. recently announced that Finjan's Malicious Code Research Center (MCRC) has discovered a network of 1.9 million malware-infected computers. Corporate, government and consumer computers around the world were infected by the malware.



Trend Micro Broadens Endpoint Security Platform

Trend Micro is now offering a Power Management Module that allows enterprises to easily manage endpoints and reduce energy costs.

Survey: IT Security Budgets, Personnel Cuts Leveling Off

More than 70 percent of 1,500 U.S.-based information security professionals responding to a survey say their budgets were reduced the past six months due to the economic downturn, while 55 percent said they did not expect any additional cuts for the remainder of the year.

Economic Crisis Causing Increased Worldwide Consumer Fears About Fraud, Security Risks According To Research

Two-thirds of consumers around the world believe that the current economic crisis has impacted their personal risk for ID theft or fraud, according to research conducted in February and March by Unisys Corp.

Canadian Police Force Uses Two-Factor Authentication Solution For Added Network Security

Regulatory compliance is one of the driving forces behind many security integration decisions, forcing companies to consider solutions otherwise deemed unnecessary. Often, this results in organizations choosing the most basic product that meets the requirements with the least impact on processes and technology infrastructure. However, some organizations are choosing to integrate security technology that does more than merely comply with regulations — leading to enhanced business processes, cost cutting and increased efficiency.

Survey: Unauthorized Access To Patient Data Is Top Healthcare IT Security Concern In 2009

Imprivata Inc. recently announced the results of its second annual national survey, examining Identity Management Trends in Healthcare 2009. The online survey of IT decision makers in the healthcare field highlights some significant trends surrounding security, electronic health records (EHRs), virtualization, healthcare access management and the impact of the global recession on IT budgets, planning and priorities.

Siemens to Incorporate G&D StarSign USB Tokens

Giesecke & Devrient (G&D) is supplying Siemens Enterprise Communications (SEN) with smart cards and cryptographic USB tokens from the StarSign product family. The two companies intend to offer their customers jointly-developed company ID and identity solutions in a global cooperation model that would take effect immediately.

Healthcare Organizations Turning To Strong Authentication, Access Management Solutions

Imprivata Inc. and CDW Healthcare recently announced they are seeing a further escalating demand for the OneSign Authentication and Access Management Platform within the healthcare market.

HID Global Demonstrates Variety Of Secure Identity Solutions

HID Global will demonstrate a broad variety of solutions at ISC West. Under the theme “A World of New Possibilities,” HID’s booth (11052) shows a complete suite of products, resources and partnerships that enable end-users to conveniently implement everything from networked access control to contactless logical access solutions.

Extended Outlook

The Long Beach, Calif., police department turned to high-tech "eyes in the sky" to monitor and protect public access areas.

In a Blur

The security industry has been undergoing a series of advancements in low-light surveillance. Nonetheless, image quality in these situations does not compare to the quality of daytime surveillance.

Colleges Select Network Security Appliances To Stop Malware-Related Data Breaches

FireEye Inc. recently announced that San Francisco State University, Santa Barbara City College and Connecticut College have deployed FireEye appliances to preemptively stop data breaches caused by malware that steals student identity data, misappropriates faculty research, and exploits campus computing resources.

Indiana Schools Deploy McAfee Network Security Solutions

McAfee Inc. recently announced that School City of Hammond in Indiana has deployed McAfee’s network security solutions to secure the district’s elementary, middle and high schools from cybercrime.

Featured

  • Enhancing Security and Business Intelligence

    From border security to parking lots, ALPR has gained traction across multiple use cases as the technology becomes more accurate and affordable than ever. I spoke with Jason Cook, business development director at Vaxtor, a leader in ALPR AI-based analytics, and Rui Barbosa, category manager, Surveillance Products at i-PRO, a maker of AI-enabled security cameras, to delve into the latest advancements and applications of ALPR technology. Automated License Plate Recognition (ALPR) has transformed significantly over the years, evolving from a niche technology into a powerful tool for a wide range of applications, particularly in border security. Read Now

  • Leveraging Smart Sensors

    The integration of smart sensors with data-driven video technology provides schools with a comprehensive solution to enhance safety and security. This combination offers advanced capabilities such as environmental monitoring, audio analytics, vape detection and unified data management, empowering schools to create a secure and healthy learning environment for students and staff. Read Now

  • Unlocking the End-user Perception

    An observation as a creator of identity verification solutions is that while industry leaders are often excited by the opportunity to leverage biometrics, there are often concerns raised about the end-user mindset during the conversation. Primarily, what are end-users’ expectations of biometric technology? What concerns might they have about its usage to authenticate and protect their access? Read Now

  • 4 Killed, 9 Injured at Georgia High School Shooting

    Four people were killed and nine were hospitalized after a shooting at Apalachee High School in Winder, Georgia on Wednesday. That’s according to CNN. Read Now

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3