The LIME Tag will also help pharmaceutical manufacturers and other cold chain distributors track and monitor product temperature history.
http://www.darkreading.com/document.asp?doc_id=121254&WT.svl=wire_4
Security News Curated from across the world
The LIME Tag will also help pharmaceutical manufacturers and other cold chain distributors track and monitor product temperature history.
http://www.darkreading.com/document.asp?doc_id=121254&WT.svl=wire_4
“IBM ISS understands that scalability is a key ingredient for offering customers a comprehensive set of options for their enterprise security needs,” said Rob Ayoub, Industry Manager, Network Security with Frost & Sullivan. “The addition of a lower-cost intrusion prevention appliance to the company’s product line extends its powerful, preemptive protection capabilities to a broader set of companies, and enables larger companies to cost-effectively shield additional segments of the network from attack.”
Until now, companies needing to protect these points have only had limited-feature IPS offerings available to them. “Long gone are the days when a firewall and antivirus solution were enough to protect a corporate network,” said Greg Adams, Business Line Executive, Network Solutions for IBM Internet Security Systems.
http://www.iss.net/about/press_center/releases/us_intrusion_protection_remote.html
azil excels in the area of information security, and is a world leader in IT risk management solutions.
http://www.darkreading.com/document.asp?doc_id=117646&f_src=darkreading_section_297
But Dimitri Stiliadis, chief of architecture for Project Evros at Alcatel-Lucent Ventures, says the goal of the mobile project wasn’t just about the laptop theft epidemic. “It’s more about device management and remote control to handle the increasing population of laptops” in enterprises, he says. “It’s for patch management, backups, configuration managements, end-point security, and for [tracking and protecting] lost and stolen laptops.”
Still, Project Evros’ security features are the most compelling in this day of patch management woes and slippery laptops. “Project Evros does tackle a lot of the mobile security and device management issues that are plaguing enterprises that have a large mobile workforce,” says Sandra Palumbo, program manager for enterprise IT and communications services at The Yankee Group.
A thief would have to break the encryption algorithm and session key to get to the data, though.
The nonprofit Visiting Nurse Association of Northern N.J. will begin testing Project Evros cards sometime in the next week or so, says Michael Landsittel, manager of information technology for the association.
Project Evros is still only a prototype, and Alcatel-Lucent Ventures won’t give too much detail as of yet on its final product form, nor just how it will be distributed and marketed. But the plan is for release sometime this year, and the company also is considering this technology for PDA devices as well, says Alcatel-Lucent’s Skuler. The company is currently working with PatchLink to integrate with its patch management software, as well as with other patch management, backup, and configuration management application developers.
http://www.darkreading.com/document.asp?doc_id=117452&f_src=darkreading_section_296
OpenID is a decentralized digital identity system, in which any user’s online identity is given by URI (define), such as a Web address, and can be verified by any server running the protocol. Web sites that support OpenID are fashioned in such a way that Internet users don’t need to create and manage a new account for every site before being granted access; users need only to authenticate with an identity provider that supports OpenID.
Gates and Microsoft Chief Research and Strategy Officer Craig Mundie also outlined Microsoft’s conceptual approach to supporting Trustworthy Computing. Mundie said policy will be the key to managing computer access, rather than the gear connecting to the network. This includes adapting to the evolution of networks, protection and identity.
Gates also said Microsoft is a strong supporter of IPSec (define) and IPv6 (define). IPsec calls for Internet Protocol (IP) communications to be protected by authenticating or encrypting each IP packet in a data stream.
Microsoft announced Identity Lifecycle Manager (ILM) 2007, which adds support for managing strong credentials such as certificates and smart cards over, as the name suggests, the life cycle of a user identity. The company will rev ILM “2” in late 2008.
Microsoft also announced the public beta of the new Forefront Server Security Management Console, a Web-based management application that does on site or remote administration of Microsoft messaging and collaboration security software.
Finally, the company said it is supporting Extended Validation (EV) SSL Certificates in Internet Explorer 7. When a user visits a site with a valid EV Certificate, Internet Explorer 7 will alert the user to the identity information by turning the background of the address bar green and displaying identity information.
http://www.internetnews.com/security/article.php/3658246
CA HIPS monitors both incoming and outgoing traffic and enables centralized management of access control policies.
“Today’s sophisticated threats require a multi-faceted defense that incorporates proactive threat detection and whitelisting, working hand-in-hand with existing antivirus and anti-spyware technologies,” said Robin Bloor, partner, Hurwitz and Associates.
CA HIPS uniquely facilitates the definition and implementation of security policies by allowing administrators to create policies based on user behavior and existing examples. This “learn-by-example” approach eliminates much of the time and effort typically required for administrators to define policies for specific roles, applications and/or resources.
“IT organizations are already dealing with twice as many threats as they did even just a year ago — and those threats are getting more complex and sophisticated all the time,” said Sam Curry, vice president, CA security management.
“CA HIPS enables us to provide our customers with an additional layer of security that complements CA’s anti-spyware and antivirus solutions which have already proven to be so effective for them,” said Jimmy Barter, vice president of business development, Net-Tek Networking Solutions, a total solutions provider who resells CA’s threat management products.
http://ccbn.compuserve.com/releasetext.asp?ticker=ca&coid=83100&client=compuserve&release=959159