Search results for: software

Security: Source Access and the Software Ecosystem

The goal of this paper is to explore the relationship between the security of software and the model under which that software was produced and distributed. Additionally, this document will outline Microsoft’s position that ensuring security is a multi-dimensional process. Within the context of the development model employed in the creation of software, broad source code access ultimately has a neutral effect on the security capabilities of that software. Download the paper in PDF format … More

Computer Viruses Don’t Take A Vacation

With summer officially starting tomorrow and many users finding themselves with more time to e-mail friends or surf the Internet, the threat of computer viruses will also be increasing. Virus writers have traditionally been particularly active during the summer months as demonstrated last year by two of the most disruptive viruses ever created: Code Red and Sircam. According to The Computer Economics Security Review 2002, their combined impact has been calculated at $3.77 million dollars … More

Veridicom Announces Standalone Fingerprint Authentication Module

Substantially Reduces Integration Complexity and Increases Security for a Wider Variety of Fingerprint Authentication Solutions Sunnyvale, CA (June 17, 2002)Â?Veridicom, the recognized leader in silicon fingerprint sensors and software, today announced the availability of a new standalone fingerprint authentication module and a development kit for embedded applications. Matchboardâ„? allows systems integrators and OEMs to easily embed Veridicom fingerprint sensor capabilities into applications such as physical access, time and attendance, automotive, and high security trusted peripherals. … More

RSA Security Announces RSA Keon Web Server SSL Solution to Help Protect the Privacy of Transmitted Data

New solution helps provide organizations with a cost-effective method for addressing Web authentication and online trust requirements compared to service-based models BEDFORD, Mass., June 19, 2002 — RSA Security Inc. (NASDAQ: RSAS), the most trusted name in e-security®, today announced the RSA Keon® Web Server SSL solution designed to help organizations establish and conduct trusted e-business transactions with their customers and partners. The RSA Keon Web Server SSL solution is designed to establish trust that … More

Voice Authentication Launched to Safeguard Australian Finance Community

Trust5, the wireless identification company, has signed an exclusive agreement with leading Australian telecommunications company, Optus, to launch its products into the Australasian market. Optus will sell Trust5’s unique range of secure mobile payment authentication and voice print technologies to Australian banking, insurance and online share trading companies. This will provide the companies with a more flexible and secure method for validating employee and customer identities. Trust5 is a client of Enterprise Ireland, the Irish … More

Kyberpass Teams with IBM to Deliver Trusted e-Payments Solution to Banks Around the World

Fully integrated solution leverages Kyberpass TrustPlatform to help Identrus banks conduct standards-based trusted B2B transactions LONDON, June 19, 2002 – Kyberpass® Corporation today announced at the Identrus Participants Forum in London, that they are working with IBM to offer a fully integrated online trusted e-payments solution designed for Identrus member banks. This joint e-Payments offering will enable banks and other financial institutions to more easily adopt the standards-based Identrus framework to provide secure solutions to … More

StarForce Announces M3/Replitech 2002

StarForce Technologies Will Exhibit Its Copy Protection Systems and Present at Key Conference Discussions MOSCOW, Russian Federation –June 19, 2002—StarForce Technologies is pleased to announce their activities line-up at M3/Replitech 2002 in Amsterdam June 24 – 26, 2002. StarForce Technologies will show its strength in copy protection by providing live demonstrations of its copy protection systems and by contributing in panel discussions. Visitors to the booth #201 will be able to see first-hand how easy … More

Leading Cable Device Providers Choose RSA Security to Help Secure Broadband Connections

Manufacturers Trust RSA BSAFE® Security Software to Protect Customer Privacy, Help Avoid Theft and Comply with Cable-Industry Standards BEDFORD, Mass., June 18, 2002 — RSA Security Inc. (NASDAQ: RSAS), the most trusted name in e-security®, today announced it has strengthened its position as a broadband security market leader by providing DOCSISâ„? (data over cable system-interface standard)-compliant security tools and services to an expanding list of leading cable modem and set-top box providers. Cable modem manufacturers … More

Utimaco Safeware and Ernst & Young IT-Security GmbH form strategic cooperation

Oberursel, 18 June 2002 – Utimaco Safeware AG and Ernst & Young IT- Security GmbH have formed a strategic cooperation which offers major customers professional solutions and advisory in the field of information security. Ernst & Young IT-Security GmbH, a subsidiary of the global audit and advisory company Ernst & Young, offers extensive advisory and services for information security. Utimaco Safeware’s range of IT-security solutions includes security products for PCs, Notebooks and Personal Digital Assistants … More

PivX Provides Free Fix For The Microsoft Internet Explorer Gopher Hole

Source: Internet Wire Publication date: 2002-06-13 NEWPORT BEACH, CA — (INTERNET WIRE) — 06/13/2002 — PivX Solutions, the creator of the patented and proprietary network intrusion security system Inviswallâ„? announced today that they have created a FREE Patch/FIX for the latest Microsoft® Internet Explorerâ„? security hole- Gopher Root Vulnerability[1]:(online.securityfocus.com/news/464) or (online.securityfocus.com/bid/4930/info) “It would not take many minutes to put up a gopher server with a Win32’rootkit’ as content, and then put an innocent but interesting … More

GFI Launches GFI Mail essentials for Exchange 7

Arsenal of email tools for Exchange Server including anti-spam, disclaimers & POP3 downloader London, UK, 17 June 2002 – GFI has launched GFI Mail essentials for Exchange 7, a new product that adds essential email tools to Microsoft Exchange Server, including anti-spam, disclaimers, mail archiving, Internet mail reporting, server-based auto replies and POP3 downloading. GFI Mail essentials 7 offers essential email features not found in Exchange Server to provide more effective corporate email use. With … More

France Telecom’s SNPI Division Calls On Ca’s Unicenter To Slash Operating Costs And Improve Quality Of Service

Global Telecom Subsidiary Improves Data Transfer Reliability and Realizes Annual Savings of More Than 200,000 Euro Since Deploying Unicenter TCPaccess X.25 Server ISLANDIA, N.Y. and NANTERRE, FRANCE, June 17, 2002 – Computer Associates International, Inc. (CA) today announced that Service National de Production Informatique (SNPI), the in-sourced IT services provider for France Télécom, has chosen CA’s Unicenter TCPaccess X.25 Server (previously SOLVE:X.25) to optimize the transfer of critical, fixed-line telephone invoicing data. France Télécom is … More