January 2010 Issue of SCMagazine
Just as Queen and David Bowie were in 1981, chief information security officers today are under pressure. Surprise, surprise, right?
Legitimate companies should consider hiring former black-hat hackers.
Damballa, provider of anti-botnet solutions, has named Val Rahmani as chief executive officer. Rahmani previously served as general manager of IBM Internet Security Systems. In ...
The MashSSL Alliance, an organization dedicated to promoting the use of the MashSSL open specification, has formed. MashSSL, in the process of being standardized, lets ...
Neustar, provider of managed DNS services, has teamed up with Infoblox, maker of network services appliances, to resell each other's services and products. Customers now ...
NetWitness, provider of automated threat intelligence and real-time network forensics, has partnered with SRA International. The technology and services provider will resell NetWitness NextGen as ...
Archer Technologies, provider of enterprise governance, risk and compliance (GRC) solutions, has teamed up with KPMG. The audit, tax and advisory firm will leverage its ...
LogRhythm, maker of log management and SIEM solutions, has appointed Preston Lawhorne to vice president of sales for the Americas. He previously served as VP ...
Threat of the month
2 minutes on
A new case could set precedence for a merchant community often overwhelmed by the burden of PCI compliance.
Skills in Demand
Corporations are seeking information security engineers as a "mission critical hire."
Me and my job
Information, left unattended, will lose its integrity.
Finding more resistance than ever from large businesses, hackers are customizing their malware ploys for SMBs, reports Dan Kaplan.
Can security be better in the cloud? Experts believe it can, reports Deb Radcliff.
The winners of the prestigious 2010 SC Awards U.S. will be announced on March 2 in San Francisco.
Application whitelisting offerings are appealing to more organizations due to a rise in malware, reports Angela Moscaritolo.
Security budgets are holding their own - even in the toughest economy since the Great Depression, reports Illena Armstrong.
We kick off the new year with a look at authentication from two perspectives.
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Group Test 1
The ACTAtek device uses optical technology to read finger- and thumbprints, which it then transfers into templates and stores on the system.
Biometric Network Logon 2007 R2 from Bayometric offers a fully integrated server-/client-based biometric logon system for Microsoft Windows networks.
The IDenium biometric system from Bio-Metrica provides a solid integrated platform for distributing biometric fingerprint logon for users throughout the enterprise environment.
The Intelli-Pass Biometric Access Control System from Black Box uses latest-generation fingerprint verification and a unique split-architecture design to provide solid security in access control.
CeeloxID Server Edition v22.214.171.124 provides biometric fingerprint scanning for workstation domain logon, as well as single sign-on to programs and websites all in one centrally ...
Integrated Biometrics’ TRU650 Biometric Access Control system is an enterprise-level system providing fingerprint access for high security applications.
The Triad Enterprise Authentication and Migration System (TEAMS) system from Triad Biometrics takes a new look at enterprise-level fingerprint biometric network security authentication.
Group Test 2
The Celo v3 product from Commerce Media offers a highly customizable, flexible and scalable two-factor authentication (2FA) tool for securing IT systems, protecting data and/or ...
Comodo Authentication Solutions prevent fraudulent account access risks through easy-to-use and easy-to-deploy PKI client authentication certificates.
BlackShield ID Professional Edition v2.51 is an authentication platform that simplifies the implementation, management, control and provisioning tasks related to protecting a network from unauthorized ...
A single, unified authentication system designed to provide strong two-factor and mutual two-way authentication for different types of applications and different groups of users.
An open, versatile authentication platform that enables security across diverse users, transactions and applications.
Combines smart card-based PKI functionality with up to 2GB of encrypted mobile storage on a USB device.
A Windows application that runs on an enterprise server.
Works by using a phone as a second factor of authentication, something you have. There is no software for end-users to install.
The PortWise virtual appliance includes the PortWise identity and access management product suite, a software package for enterprises looking to manage all their remote access ...
Enables admins to use something you know (PIN/password) plus something you have (hardware token/mobile device) to ensure remote users accessing one of many different environments ...
A smart card-based USB token that uses a PKI infrastructure to generate and store users' personal credentials - such as private keys, passwords and digital ...
The aXsGUARD Identifier uses Identikey authentication server. Instead of using a single factor login and static password, employees can use a Digipass token to logon ...
Add competition to your security education program, says Robert Fanelli, U.S. Army.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Government 'Cybersecurity Sprint' spurs agency authentication measures
- Report: News, entertainment websites serve majority of malvertisements
- UConn School of Engineering cyberintrusion originated in China
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries