• July 3, 2013

    Wave installs server for BASF

    Computing company Wave Systems has completed the installation of its Remote Administration Server for BASF's PCs and laptops.

    The server activates the German chemical company's self-encrypting drives (SEDs) for PCs and laptops in seconds, sets security policies and protects data if a laptop goes missing.

    SEDs, which are built in solid state or traditional rotating disks, are among the most secure, transparent and high speed encryption options available, said the company.

    Read More...

  • May 10, 2013

    Wave Systems launches Wave Knowd web service

    Wave Systems, a security vendor, has launched Wave Knowd, a new web service available for preview which reduces the vulnerability and use of passwords by leveraging the unique identity of computing devices.

    Read More...

  • April 22, 2013

    Trusted platform module aids Windows mobile device security

    Technology that already keeps enterprise data secure on servers and networks has made its way onto Windows mobile devices.

    Windows-based notebooks and tablets incorporate the trusted platform module (TPM) chip, a product and specification that adhere to the Trusted Computing Group's security architecture.

    Read More...

  • April 22, 2013

    Trusted platform module aids Windows mobile device security

    Technology that already keeps enterprise data secure on servers and networks has made its way onto Windows mobile devices.

    Windows-based notebooks and tablets incorporate the trusted platform module (TPM) chip, a product and specification that adhere to the Trusted Computing Group's security architecture.

    Read More...

  • April 11, 2013

    Why an old technology gives Windows 8 tablets a huge security edge

    There’s mobile device management (MDM), security software, and many other new mobile security and management solutions designed to help IT better secure the growing number of BYOD devices invading the enterprise.
     

    Read More...

  • April 3, 2013

    Data protection directives and your customers

    The Information Commissioner's Office (ICO) fined UK public sector bodies more than £2m in 2012 for inadequate data handling practices.

    As we approach the third year since the Data Protection Act came into force, such instances of malpractice are expected to increasingly come to light in the private sector as well as in the public sector.

    Last year's draft European Data Protection Directive presents a significant opportunity for the channel as enterprises need help to ensure their devices are encrypted and compliant.

    Read More...

  • April 2, 2013

    Outlook good for Microsoft in the mobile enterprise wars

    Recent research put out by the Aberdeen Group has shown how Microsoft products are dominating the rollouts for enterprise mobile app deployment in 2013.

    In a blog post on the Aberdeen site, enterprise mobility and collaboration research director Andrew Borg likens the scenario to David and Goliath, with the key protagonists – Apple, Samsung, BlackBerry and Microsoft – switching roles with each new phone release.

    Read More...

  • March 31, 2013

    Secrets of Enterprise Storage

    Legal compliance and privacy protection concerns and legislation are driving greater interest in preventing unauthorized access to data by companies.  This is leading to an increasing interest in encrypting data so it cannot be read by anybody who doesn’t possess the encryption key.  Protecting data from unauthorized access has become one of the critical issues for companies as well as governments.

    Read More...

  • March 27, 2013

    App for Business and Consumers Encrypts Social Media Posts for Privacy

    As social media networks have become more prevalent, so have companies’ concerns about privacy. In response, Wave Systems, a public company based in Lee, Mass., has introduced a Web service called Scrambls that allows users to control who sees their messages on social networks such as Facebook, Twitter, and Pinterest. The service, designed for both enterprises and consumers, also can encrypt emails.

    Read More...

  • March 25, 2013

    Does Windows 8 Surface Pro's security credentials signal the decline of MDM?

    According to Forrester's recently launched 2013 Mobile Workforce Adoption Trends report, the demand for Microsoft's Surface Pro tablet is rife.

    Based on interviews with more than 9,700 workers around the world, nearly a third (32 per cent) suggested that their preferred next tablet would be a Windows device, compared with just 26 per cent who would opt for an iPad.

    Read More...

  • March 4, 2013

    Windows 8 Surface Pro: Is it the tablet to put your CIO’s BYOD concerns to rest?

    The much-anticipated Surface Pro launch was met with widespread shortages, with reports of long lines of would-be buyers in Seattle and Bellevue. Within a matter of hours, the 128 GB version had sold out online.

    If these shortages are an accurate reflection of the demand Microsoft was hoping for, it’s just a matter of time before the first Surface Pros (and their kin) start appearing in your organisation.

    And if you’re the CIO, it’s not too soon to start thinking about the implications – from compliance to security and management.

    So what’s the plan?

    Read More...

  • March 3, 2013

    Web Privacy Becomes a Business Imperative

    SAN FRANCISCO — Privacy is no longer just a regulatory headache. Increasingly, Internet companies are pushing each other to prove to consumers that their data is safe and in their control.
     

    Read More...

  • February 27, 2013

    Security threats towards nations' critical infrastructures

    For any nation, protecting critical infrastructure is, as the term suggests, critical.

    As the US Department of Homeland Security (DHS) stated recently, critical infrastructure is the backbone of our country's national and economic security. Such infrastructure encompasses power plants, chemical facilities, cyber networks, utilities, public health and government buildings. As more and more of these entities and systems become connected to (and powered by) the internet, they have become easier to manage than ever before.

    Read More...

  • February 27, 2013

    RSA: We Are Living in a 'Cyber Warm War'

    Two of the most talked about events at this year's RSA conference were the executive order from the President to increase cyber security in the U.S., and the report from Mandiant which traced hacker activity to within China. After speaking with several security professionals today, it's clear that we're living on the edge of cyberwarfare.

    Three Kinds of Cyberwar

    Read More...

  • February 27, 2013

    At age 10, Trusted Computing Group sees a new world of threats

    SAN FRANCISCO — The Trusted Computing Group, an industry security standards organization, is celebrating its 10th anniversary at this week's RSA security conference.

    Best known for the Trusted Platform Module (TPM) security chip, the organization more recently has published specs for integrating network security information into the government's Security Content Automation Protocol (SCAP).  Sessions at its conference workshop will focus on network security trends and data protection in a rapidly changing IT landscape.

    Read More...