Cyveillance IP Block List: Real-Time Data Protects Against Online Threats 17. March 2010 by Thomas Jannot Cyveillance announced it will offer its Cyveillance IP Block List, which ought to reduce network and user exposure to live threats through real-time data feeds. As online malicious activity continues to grow in volume and complexity, this service ought to allow enterprises to adopt a more proactive, outward-looking security posture.
Disaster Recovery Directory 2009/2010: Comprehensive List Facilitates Disaster Recovery 15. March 2010 by Thomas Jannot Research and Markets has announced the addition of the Edwards Disaster Recovery Directory 2009/2010 directory to their offering. The 2009/2010 18th edition of the Edwards Disaster Recovery Directory ought to be a comprehensive resource for emergency planning, business continuity, disaster recovery and restoration available.
Air Magnet Enterprise: Delivers Zero-Day Protection Against Wi-Fi Exploits 12. March 2010 by Thomas Jannot Air Magnet Inc. announced that Air Magnet Enterprise, a premier application for managing and securing corporate WLAN deployments, ought to deliver zero-day protection against the latest Wi-Fi security exploits and vulnerabilities.
Kanguru Defender Elite: Remotely Manageable, Encrypted USB Drive with AV 10. March 2010 by Thomas Jannot Kanguru Solutions today announced its Kanguru Defender Elite to receive Federal Information Processing Standards (FIPS 140-2) Certification. The Kanguru Defender Elite offers remote manageability, hardware enryption, and an Anti-virus solution. According to Kanguru the Defender Elite is the world’s most manageable, secure flash drive. FIPS 140-2, a federal security accreditation program managed by the National …
Acxiom Identity Data on Demand: Easy, Fast and Safe Identity Online Verification 8. March 2010 by Thomas Jannot Acxiom today announced Acxiom Identity Data on Demand that gives companies that need to identify and verify customers a single, cost-effective application programming interface. Acxiom Identity Data on Demand ought to provide as-needed access to Acxiom’s identity data solutions to protect consumers and safeguard Internet transactions beyond reliance on user name and password. Companies can …
NIDS Touchpad Display Card: Powered Display Card Credential Offer Strong Security 5. March 2010 by Thomas Jannot Nagra ID Security (NIDS) announced the latest in its family of Powered Display Cards, the 306 Series. A 6-digit Powered Display Card credential providing strong security with integrated 12-button touch keypad packaged in a familiar card form factor. The touch keypad ought to support various onboard applications such as PIN activation, challenge response and access …
Keynote Mobile Device Perspective 4.0: Real-Device Monitoring for Mobile Applications 3. March 2010 by Thomas Jannot Keynote today announced Keynote Mobile Device Perspective 4.0, a complete solution for mobile application monitoring and on-demand troubleshooting. With the release of MDP 4.0, Keynote has added more smartphones including Apple iPhone, Android G1, BlackBerry Curve and Nokia N95 to its on-demand global test and measurement network and included a new add-on option called Mobile …
Cloud Computing Security Standards: Survey Details Importance and Urgency of Standards 1. March 2010 by Thomas Jannot IEEE and the Cloud Security Alliance (CSA) today announced results of a survey of IT professionals that reveals overwhelming agreement on the importance and urgency of cloud computing security standards. Although enterprises are eager to adopt cloud computing, regulatory requirements demand security standards compliance.
Axcess Dot Wireless Credential: Local Area Wireless Business Credential Product 26. February 2010 by Thomas Jannot Axcess International has announced Dot Wireless Credential, a local area wireless business credential product that ought to give businesses the option to augment existing access control and ID systems to provide added-value solutions inside the enterprise in a single ID card. As a first of its kind, this card combines short range manual ID and …
Passlogix V-Go UAM: Authentication Solution for Logon to MS Windows 24. February 2010 by Thomas Jannot Passlogix today announced V-Go Universal Authentication Manager (V-Go UAM), a strong authentication solution that ought to enable Microsoft Windows to accept any identification device for logon – including door access (RFID) badges, government-issued citizen identity cards, standalone or built-in laptop biometrics, one time passwords via mobile phones, and question and answer sequences.