Simple is Smart

Security takes on a new perspective when looking at the IT side of the aisle. After my first day through the RSA Conference in San Francisco, I have to say Cherry’s FIPS 201 compliant keyboard makes simple look pretty smart.

The keyboard is where the authentication takes place, rather than, as Craig Kaliebe, the company’s marketing manager put it, “risking the PC to attack.” The authentication card simply slides in the designated spot on the keyboard, and voilà, authentication begins.

Cherry is part of ZF Electronics Corp., based in Pleasant Prairie, Wis.

Secure-pin entry is the safe transmission of the PIN of a chip card, or a smart card, from the user to the card without the data reaching the computer. The security pin is so important that it gives the user the right to read or write, and verify that you are the owner of the card. With the verification process taking place on the keyboard, the PIN will not be transferred to the PC, instead transmitted within the keyboard directly to the smart card.

So it is not possible to spy the PIN from the data line of the keyboard wire or with a keylogger on the PC.

I also enjoyed a briefing from DataLocker officials who showed off their secure, writeable DVD and compact disc. It combines AES 256-bit encryption and disc burning functionality, all self-contained on a recordable CD or DVD. It has its own built-in software for disc burning and government strength FIPS 140-2 AES 256-bit encryption.

The best part is that there is no software to install and no need for third-party applications. It gives users a simple, secure method to transport, share and archive sensitive data and records.

There is a lot of talk about clouds this year at RSA in San Francisco. I’m going cloud hunting tomorrow and hope to let you know what I find.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

  • The Core Value Proposition

    The Core Value Proposition

    Machine and deep learning algorithms are everywhere in our lives. Masquerading as AI, they are only in their infancy. Have a conversation with a ChatGPT chatbot, and it becomes clear just how far we have come in a short time and how far we have to go. Read Now

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

Featured Cybersecurity

New Products

  • SecureAuth

    SecureAuth

    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • Kangaroo Home Security System

    Kangaroo Home Security System

    Kangaroo is the affordable, easy-to-install home security system designed for anyone who wants an added layer of peace of mind and protection. It has several products, ranging from the fan-favorite Doorbell Camera + Chime, to the more comprehensive Front Door Security Kit with Professional Monitoring. Regardless of the level of desired security, Kangaroo’s designed to move with consumers - wherever that next chapter may be. Motion sensors, keypads and additional features can be part of the package to any Kangaroo system in place, anytime. Additionally, Kangaroo offers scalable protection plans with a variety of benefits ranging from 24/7 professional monitoring to expanded cloud storage, coverage for damage and theft. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3