The Samsung Galaxy Tab is not suitable for enterprise use due to its serious security failings,according to security specialist Context Information Security. Research conducted by Context Information Security examined the three most ...
Suprema’s Face Station technology has been able to go beyond the limits. Great success has been gained in facial recognition through the technology. This is why Suprema has won the Innovative Achievement Award in Detektor ...
Intel on Thursday demonstrated multi-gigabit wireless docking technology that affords speeds of up to 7Gbps, 10 times the rate of the fastest Wi-Fi networks based on the IEEE 802.11n standard. At its annual Intel Developers Forum, the ...
Tags: Intel, wireless docking technology, US, Wireless networking
There is zero unemployment in IT security,suggesting a huge shortage of skills in the profession,says Hord Tipton,executive director of professional certification body(ISC)2. But there needs to be a focus on training people to be ...
Tags: Skills shortage, unemployment in IT security, zero unemployment
Remote Authentication Dial-In User Service (RADIUS) servers are common in enterprise networks to offer centralized authentication, authorization and accounting (AAA) for access control. But RADIUS servers can also be useful in small and ...
Tags: wireless networking, RADIUS, Wi-Fi net, Elektron
A front runner of biometric research and development,a company Suprema has had a breakthrough in technology that I find to be very beneficial:The Facestation! The Facestation is a facial recognition door access control device that was ...
Tags: Facial, Decoration, Suprema
The night watchman and the IT security guy rarely work together even though their jobs,at the core,are similar:to protect the company.At many organizations,physical and information security remain separate entities by happenstance and by ...
The majority of IT departments might accept employees are using their tablets and smartphones in the workplace, but less than a quarter have policies to control it. This was the finding of new research published by LANDesk today. Of the ...
Tags: tablets, smartphones, software, personal devices
The value of data to cyber criminals Plan for cyber attacks Defence in depth against cyber attack Comprehensive approach to APTs Stuxnet,Duqu,Flame,and Gauss have nothing to do with businesses that are not involved in finance and critical ...
Tags: cyber criminals, cyber attack, OTMS, IT security
Extending its line of identity management software, Quest Software has released an application to help administrators more easily control who accesses documents on the corporate network. While enterprise applications such as Oracle's ...
Tags: Quest, software, identity management software, enterprise applications
IDG News Service - Microsoft has released Attack Surface Analyzer 1.0, a free tool that can help system administrators, IT security professionals or software developers understand how newly installed applications can affect the security of ...
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application
Market-leading security products supplier,ESP Ltd,is expanding its access control range with the launch of two new audio door entry products-Evoke,an audio door entry system and Evoke KP,featuring an integral access control pin code keypad. ...
Tags: ESP, Audio Access, video door entry, security screws
Home Automation,Inc.(HAI),the leading manufacturer of integrated automation and security products since 1985,announced today that two HAI products won Commercial Integrator BEST awards. HAI's MicroControl(HAI part number 81A00-2WHZB)has ...
Tags: Manufacturer, HAI, Lighting Product
Tata Communications has announced a network connecting financial institutions across some of the world's biggest cities. The network aims to offer low-latency connections to financial companies through a single network from one provider. ...
Tags: Tata Communications, network, data transfer, Global Financial Hubs