{"id":500,"date":"2003-12-10T00:00:00","date_gmt":"2003-12-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/10\/new-wares-debuts-at-infosecurity\/"},"modified":"2021-12-30T11:37:29","modified_gmt":"2021-12-30T11:37:29","slug":"new-wares-debuts-at-infosecurity","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/10\/new-wares-debuts-at-infosecurity\/","title":{"rendered":"New Wares Debuts At InfoSecurity"},"content":{"rendered":"<p>With security the top priority of enterprises for the foreseeable future, it&#8217;s no shock that vendors keep pushing the innovation envelope.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At InfoSecurity 2003, a conference and expo targeting enterprise security that opened Monday in New York City and wraps up Thursday, a slew of security providers rolled out a solid slate of creative new wares.<\/p>\n<p>Network Intelligence released the newest version of its security event management (SEM) software, enVision 2.001.  The new software, which is integrated into Network Intelligence&#8217;s own line of security appliances, sports additional device support, improved analysis of security events &#8212; it can handle as many as 50,000 sustained events per second, according to Network Intelligence &#8212; and a new method of calculating the severity of events based on Homeland Security&#8217;s severity levels.<\/p>\n<p>Cryptolog launched Unicity, a software-only solution that deploys digital certificates to end users based on &#8216;zero knowledge&#8217; authentication and virtual smart cards.<\/p>\n<p>Unicity uses the technique to issue digital certificates &#8212; used to authenticate users for financial transactions, to access protected documents, and to encrypt and sign e-mail messages &#8212; without the need for cumbersome hardware, said Cryptolog.<\/p>\n<p>OpenService used InfoSecurity to unveil Security Threat Manager 2.0, the latest edition of its real-time threat assessor and security monitor.<\/p>\n<p>New to STM 2.0 are improvements to its reporting skills &#8212; it now links detected threats to the lines of business they target, giving administrators a clearer picture of what&#8217;s actually under attack &#8212; topology visualizations that provide a graphical view of threat activity and allow IT staff to &#8216;drill down&#8217; into the attack.<\/p>\n<p>NeoScale Systems announced the impending release of CryptoStor for Tape 1.2, a high-speed tape protection appliance that compresses, encrypts, and digitally signs data as it&#8217;s recorded on physical or virtual tape libraries.<\/p>\n<p>New to 1.2 is support for IBM Tivoli Storage Manager, adding to existing support for backup apps from Veritas, Legato, Hewlett-Packard, and Computer Associates.<\/p>\n<p>Based on a client\/server architecture, Global Command Center lets administrators access, share, and synchronize firewall configurations across the enterprise; create and enforce firewall and VPN policies; and monitor and control firewall activity from a central location.<\/p>\n<p>More info: [url=http:\/\/www.techweb.com\/wire\/story\/TWB20031210S0005]http:\/\/www.techweb.com\/wire\/story\/TWB20031210S0005[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-500","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=500"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/500\/revisions"}],"predecessor-version":[{"id":2987,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/500\/revisions\/2987"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}