Information Security



Optical sensors available in many housing options
January 2003, Sensors & Transducers
Telco sensors are available in a broad range of housings, suitable for both through-beam and diffuse proximity modes of operation. The remote sensor series consists of both transmitter (LT) and receiver ...

Read more...
Enhanced integration capabilities for spatial analysis
December 2002, GIS - Geographic Information Systems
Intergraph Mapping and GIS Solutions announced that it has expanded the company's transportation infrastructure management solutions by offering new interface capabilities that merge Intergraph's GeoMedia ...

Read more...
Commercially available data warehouse
December 2002, PLM - Product Lifecycle Management
SmartPlant Foundation is a commercially available, process industry-standard data warehouse using a business object data model for plant information management. This ensures an open system and an independent ...

Read more...
Sanyo Electric implements PLM solution
December 2002, PLM - Product Lifecycle Management
Sanyo Electric, Home Appliances Company, motor applied products division, working jointly with Sanyo Electric Software, has implemented EDS's Teamcenter product lifecycle management (PLM) software solution ...

Read more...
NamITech helps to secure Summit networks
November 2002
During the extensive build-up to the World Summit 2002, many valid concerns were raised about the security of the networks for the event and what the potential negative repercussions of a hack would be. ...

Read more...
Information security solution
September 2002
HID's pcProx desktop proximity reader - available locally from Honeywell-TeqTrader - has been integrated into a variety of third-party software offerings specifically geared towards information security. BioNetrix ...

Read more...
Physical and environmental protection
July 2002, Security
Ask any person who has had his or her laptop stolen, and they will tell you that physical security of data is as vital as virtual security of data. It is two o'clock, Wednesday afternoon, emotions are ...

Read more...
Metropolitan storage farms - the key to improved business continuance
May 2002, Storage
One of the key elements of business continuance is the ability to maintain critical business operations by mitigating the effects of downtime. This translates into recovering and restoring computing operations ...

Read more...
Well-defined security policies essential
December 2001
It is not enough merely to secure one's IT infrastructure - telephone systems, physical security and social engineering must also all be considered as part of a comprehensive security policy. "The best ...

Read more...
Access all areas
September 2001
The HR issue of security compliance can and should also supplement any technical safeguards as well motivated staff are less likely to transgress either intentionally or unintentionally

Read more...
New package to track IT assets
June 2001
Local company, FrontRange Solutions (FRS), recently announced the launch of HEAT Asset Tracker, aimed at keeping track of a company's IT investments. FRS is an international supplier of software for automating ...

Read more...
Network user interface
May 2001, Infrastructure
The WJ-NT104 from Panasonic is fully equipped with image capture, JPEG and HTTP server functions. It can provide multiple site monitoring which can be conducted from multiple locations (PC), enabling ...

Read more...
Price alteration: the latest crisis for online shopping
May 2001
e-commerce has received a body blow with the revelation that any user with a browser can alter prices of goods online and effectively get them for a steal. Ian Melamed, Chief Technology Officer of Satellitesafe, ...

Read more...
One-stop solution to counter modern threats
March/April 2001
"There is a definite need to train and educate security staff regarding industrial espionage

Read more...
Secure m-commerce applications
March/April 2001
Comverse, a supplier of software and systems enabling network-based enhanced services, has announced the availability of a solution for end-to-end multi-access security for wireless Internet services. The ...

Read more...
Data, not hardware, is a company's most valuable asset
March/April 2000
During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.

Read more...
MasterCard successfully processes during Leap Year Day 2000
March/April 2000
MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone. Because of concerns that computers might misinterpret the value of '02/29/00', ...

Read more...
Data, not hardware, is a company's most valuable asset
March/April 2000
During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled. Just another South African crime statistic, one may ask? "No, almost ...

Read more...
28 frightening IT facts
July '99
The recently released 1999 CSI/FBI Computer Crime Survey details what 521 companies from various industries and of various sizes are doing to secure their computer systems. The results highlight why security ...

Read more...



<< First   < Previous   Page 80 of 80