At InfoSecurity 2003, a conference and expo targeting enterprise security that opened Monday in New York City and wraps up Thursday, a slew of security providers rolled out a solid slate of creative new wares.
Network Intelligence released the newest version of its security event management (SEM) software, enVision 2.001. The new software, which is integrated into Network Intelligence’s own line of security appliances, sports additional device support, improved analysis of security events — it can handle as many as 50,000 sustained events per second, according to Network Intelligence — and a new method of calculating the severity of events based on Homeland Security’s severity levels.
Cryptolog launched Unicity, a software-only solution that deploys digital certificates to end users based on ‘zero knowledge’ authentication and virtual smart cards.
Unicity uses the technique to issue digital certificates — used to authenticate users for financial transactions, to access protected documents, and to encrypt and sign e-mail messages — without the need for cumbersome hardware, said Cryptolog.
OpenService used InfoSecurity to unveil Security Threat Manager 2.0, the latest edition of its real-time threat assessor and security monitor.
New to STM 2.0 are improvements to its reporting skills — it now links detected threats to the lines of business they target, giving administrators a clearer picture of what’s actually under attack — topology visualizations that provide a graphical view of threat activity and allow IT staff to ‘drill down’ into the attack.
NeoScale Systems announced the impending release of CryptoStor for Tape 1.2, a high-speed tape protection appliance that compresses, encrypts, and digitally signs data as it’s recorded on physical or virtual tape libraries.
New to 1.2 is support for IBM Tivoli Storage Manager, adding to existing support for backup apps from Veritas, Legato, Hewlett-Packard, and Computer Associates.
Based on a client/server architecture, Global Command Center lets administrators access, share, and synchronize firewall configurations across the enterprise; create and enforce firewall and VPN policies; and monitor and control firewall activity from a central location.
More info: [url=http://www.techweb.com/wire/story/TWB20031210S0005]http://www.techweb.com/wire/story/TWB20031210S0005[/url]