Features

Clearfix
Sat
21
Feb
fvadmin's picture

Secure security networks

A FUNCTIONAL security solution depends on a series of layers whether you’re dealing with physical or logical security issues. You need walls and gates, well-lit places where attacks are obvious, gatehouses where incoming traffic can be checked and access controlled doors driven by an up-to-date access database. You also need intrusion alarms alerting of unauthorized entry and a surveillance system that lets you oversee what’s happening on the network.

You will need high security locations on a network just as you do in physical sites where there may be a systems room, a bond store or a security control room. And finally you’ll need a response and management team with a clearly defined chain of command. Think about the security of your networked security devices in this way and you won’t go wrong.

Read More
Thu
19
Feb
fvadmin's picture

Disaster recover and fault tolerance

SOME manufacturers may claim that off-the-shelf computer products are as reliable as the best proprietary DVR solutions but this is not the case. Most computer systems operate in an environment that does not demand perfect operation and there is less emphasis on reliability and onboard redundancy.

Better DVRs are custom-built for their role with powerful streaming capabilities, bulletproof operating systems, multiple ports and either mirrored HDDs or onboard RAID storage. They also have the ability to support multiple monitors and analogue CCTV cameras. As part of your disaster recovery plans you need to think hard about which type of solution will greatest reliability.

Read More
Sun
16
Jul
fvadmin's picture

Feel The Motion

SafePods for Internet Explorer is a pending patented technology that is not an anti-virus tool, not a firewall, not an anti- spyware tool, and does not ask the user any security questions. "We wanted to create a real, out of the box solution, one that would allow users to be secured, be free and manage less. This is what SafePods for Internet Explorer is all about," explained Mark Wright, chief engineer of Computers In Motion. "It passively terminates commercial espionage, Trojan horses, spyware, viruses, etc - In fact it makes them all irrelevant, while the organization doesn't lose its connectivity, productivity yet reduces its TCO." Operating SafePods for Internet Explorer is simple and effective, the technology is designed to support an "install-and-forget" working mode, hence there are no configuration requirements, and there is no need to manage SafePods for Internet Explorer.

Read More
Sun
27
Nov
fvadmin's picture

Intel Doubles Stand Size At Secutech Show

To show its determination in the digital surveillance arena, Intel has double expanded its exhibition area from 54 sq.m. to of 108 sq.m. at Asia's leading ninth annual SecuTech Expo for its twelve software design and CCTV manufacturer partners from Taiwan. Intel's presence at SecuTech Expo 2006 has proven IT market in digital surveillance area has grown raptly with opportunities. In addition to exhibiting, Intel is the keynote speaker at GDSF 2006. Intel is in the plan to overview the network technologies applied to digital surveillance, along with the development outlook on the application intelligent of IP.

Read More
Wed
22
Jun
fvadmin's picture

Internal Attacks Dog Banks

About 35 per cent of respondents confirmed encountering attacks from inside their organization within the last 12 months (up from 14 percent in 2004) compared to 26 percent from external sources (up from 23 percent in 2004).

The third annual Global Security Survey acts as global benchmark for DTT and its member firms for the state of IT security in the financial sector and consisted of interviews with senior security officers from the world's top 100 global financial institutions.

Phishing and pharming (luring people to disclose sensitive information by using bogus emails and websites) are two new additions to the top security threats financial institutions faced in the past year, underscoring the human factor as a new and growing weakness in the security chain.

Read More
Wed
08
Jun
fvadmin's picture

Five Most Hyped It Security Threats Revealed

The 5 threats include:

Read More
Tue
29
Mar
fvadmin's picture

Ricoh VMSS Protects Hard Drive Losses

In environments where classified documents are copied, scanned or printed on a digital system, an image of that information remains on the system's internal hard drive. Without permanently deleting these items, confidential information can potentially fall into the wrong hands -- a security risk that businesses and government agencies want to avoid at all costs. Internal hard drives are necessary in Multifunction Products (MFPs) to carry out complicated functions such as network printing and scanning. Yet, these traditional hard drives retain latent data, posing a security risk as unauthorized parties can possibly recover confidential information. Built on a RAM (Random Access Memory) drive, the revolutionary VMSS solves this security dilemma by deleting this information once the system enters the "off" mode.

Read More
Tue
08
Mar
fvadmin's picture

New Cyber Security Protocol

The same protocol could be employed in many computer networks in which two computers, hand-held communication devices or network nodes need to simultaneously verify the identity of each other. The protocol - called "delayed password disclosure" - was created by Markus Jakobsson and Steve Myers of Indiana University. It may have application in any environment where "mutual identity authentication" is required, the researchers say. This new security protocol could help to prevent consumers from getting tricked into connecting to a fake wireless hub at an airport, for example. Or the protocol could notify you that the link included in a legitimate-looking e-mail points to a fake website set up to steal your sensitive information, such as passwords and PINs to bank accounts, credit cards numbers and account numbers for online fund-transfer services.

Read More
Tue
21
Sep
fvadmin's picture

CEO's Ignoring Security Risks

More than 70 percent of the 1,233 organizations -- representing some of the leading companies in 51 countries -- failed to list training and raising employee awareness of information security issues as a top initiative.

As organizations move toward increasingly decentralized business models through outsourcing and other external partnerships, it becomes ever more difficult for them to retain control over the security of their information and for senior management to comprehend the level of risk to which they are exposed.

Read More
Mon
13
Sep
fvadmin's picture

Cisco Secure Servers

The new Cisco 1800 Series, Cisco 2800 Series and Cisco 3800 Series integrated services routers are the first to provide customers with an infrastructure that enables fast, secure access to business applications with optimized security, while establishing a foundation for more intelligent networks. 

"Integration of voice and network security capabilities into routers is a great way to help organizations save money and time, but the addition of these features cannot negatively impact network performance," said Jeff Wilson from Infonetics Research. "Cisco's integrated services routers will help many organizations build more efficient and robust IP networks." 

Read More

Pages