{"id":1528,"date":"2007-02-15T00:00:00","date_gmt":"2007-02-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/15\/3g-card-secures-laptops\/"},"modified":"2021-12-30T11:39:32","modified_gmt":"2021-12-30T11:39:32","slug":"3g-card-secures-laptops","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/15\/3g-card-secures-laptops\/","title":{"rendered":"3G Card Secures Laptops"},"content":{"rendered":"<p>Lost your laptop full of company secrets?  No problem: A prototype PCMCIA card developed by Bell Labs for laptops can lock that data down as soon as you&#8217;ve reported it lost or stolen, and throw away the keys.  It can also let IT locate a lost or stolen laptop via a built-in GPS on the card.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But Dimitri Stiliadis, chief of architecture for Project Evros at Alcatel-Lucent Ventures, says the goal of the mobile project wasn&#8217;t just about the laptop theft epidemic.  &#8220;It&#8217;s more about device management and remote control to handle the increasing population of laptops&#8221; in enterprises, he says.  &#8220;It&#8217;s for patch management, backups, configuration managements, end-point security, and for [tracking and protecting] lost and stolen laptops.&#8221;<\/p>\n<p>Still, Project Evros&#8217; security features are the most compelling in this day of patch management woes and slippery laptops.  &#8220;Project Evros does tackle a lot of the mobile security and device management issues that are plaguing enterprises that have a large mobile workforce,&#8221; says Sandra Palumbo, program manager for enterprise IT and communications services at The Yankee Group.<\/p>\n<p>A thief would have to break the encryption algorithm and session key to get to the data, though.<\/p>\n<p>The nonprofit Visiting Nurse Association of Northern N.J. will begin testing Project Evros cards sometime in the next week or so, says Michael Landsittel, manager of information technology for the association.<\/p>\n<p>Project Evros is still only a prototype, and Alcatel-Lucent Ventures won&#8217;t give too much detail as of yet on its final product form, nor just how it will be distributed and marketed.  But the plan is for release sometime this year, and the company also is considering this technology for PDA devices as well, says Alcatel-Lucent&#8217;s Skuler.  The company is currently working with PatchLink to integrate with its patch management software, as well as with other patch management, backup, and configuration management application developers.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=117452&#038;f_src=darkreading_section_296<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1528","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1528"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1528\/revisions"}],"predecessor-version":[{"id":4015,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1528\/revisions\/4015"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}