Some of the riskiest searches on the Internet today are associated either with finding items for free, such as music or screensavers, or looking for work that can be done from home, according to Internet security company McAfee. Search categories like these are used to lure unsuspecting consumers to their Web sites. Hackers and cybercriminals are often able to persuade searchers to download files carrying malicious software that can cause consumers to expose their personal and financial data.
RSA, The Security Division of EMC, announced it has integrated the RSA enVision security information and event management (SIEM) solution with the Cisco Mobility Services Engine (MSE) platform. This integration can help organizations to enhance IT operations, enforce security policy and accelerate response to security threats by providing IT professionals with actionable event information that is designed to include the real-time, physical location of users, hosts and devices connected to wired and wireless networks.
VIA Technologies, a leading innovator of power efficient x86 processor platforms, announced that it will be showing examples of its customized security solution service at Computex 2009 that will take place in Taiwan between June 2-6, helping customers to employ a comprehensive and effective security infrastructure in all segments.
Network security is top of mind for businesses as they work to balance the security of their private networks while still making it possible for employees who travel or rely on remote access to retrieve critical information on company servers. Verizon Wireless, announced it is providing an added convenience to remote access with the introduction of Verizon Software Token 1.0 for RSA SecurID on Verizon Wireless Media Center- and Get It Now-capable phones. Once downloaded to a compatible handset, Verizon Wireless Software Token 1.0 for RSA SecurID makes private network authentication possible without the need for hardware tokens such as key fobs.
RSA, The Security Division of EMC, announced a comprehensive set of solutions to help organizations address the most challenging aspects of complying with the U.S. Data Breach Notification Laws for protecting personally identifiable information (PII) and mitigating the risk of security breaches. Specifically, RSA is announcing three distinct packages of information security products – including two-factor authentication, security information and event management (SIEM) and data loss prevention (DLP) – designed to meet the needs of mid-sized companies.
Transcend Information, Inc., a worldwide leader in storage and multimedia products, announced its alliance with Trend Micro, Inc., a global leader in Internet content security, to offer advanced Trend Micro USB Security software preloaded on its newest USB flash drive, the JetFlash V15. With this powerful combination of Transcend hardware and industry-leading Trend Micro software, users can now share, store and manage valuable data more safely and securely.
At the Future of the Internet conference in Prague today, Gemalto, Microsoft, Nokia and Philips announced a new initiative that will address the fundamental societal issue of trust in new and emerging digital services. The initiative aims to bring European public and private stakeholders together to advance 'Trust in Digital Life' through the development of a common vision. Based on the vision, the initiative will create an agenda for innovation and promote alignment of public and private policies.
RSA, The Security Division of EMC Wednesday announced enhancements to RSA Key Manager Suite (RKM), its enterprise encryption key management system designed to manage encryption keys at the application, database, and storage layer. With new integrations and server-side management features, RKM 2.5 can help lower the total cost of ownership associated with encryption by giving administrators strong control over the vaulting and management of keys from one central location. RSA Professional Services now also offers a new Tokenization Service that is engineered to extend RKM by enabling the use of tokens to mask and protect sensitive data.