NTT and Mitsubishi Electric Develop Advanced Encryption Scheme to Increase Cloud Computing Security
Tokyo, July 28, 2010 - Nippon Telegraph and Telephone Corporation (NYSE: NTT, NTT ) and Mitsubishi Electric Corporation (TOKYO: 6503, Mitsubishi Electric ) today announced that they have developed a new advanced encryption (fine-grained encryption) scheme expected to become a potential solution to the security risks in cloud computing. This new encryption scheme achieves the most advanced logic...Read More »
Semtek and RBS WorldPay Enter Into Agreement for End-to-End Security
Semtek to Provide Security Infrastructure to Support Encryption Solutions SAN DIEGO, -- Semtek announced today it has entered into a multi-year agreement with RBS WorldPay, the U.S.-based payment processing division of The Royal Bank of Scotland Group plc, and a leading global payments provider, to supply the merchant acquirer with end-to-end security services and infrastructure for RBS WorldPay...Read More »
Notebook Computer Card provides external drive encryption.
CipherChain ExpressCard allows notebook users to secure external hard drive/SSD with AES 256-bit hardware encryption. Designed to be installed into notebook's ExpressCard 34/54 slot, unit adds eSATA port that encrypts any external eSATA hard drive or SSD when Cipher key is inserted. Port can also provide USB power to operate low power devices. Multiple keys are available with same key codes and...Read More »
Deduplication System meets application, nearline storage needs.
BitWackr(TM) B1605R delivers inline, block-level deduplication, compression, encryption, and thin provisioning for Linux and Windows NAS appliances as well as strategic Microsoft applications such as SharePoint, Exchange, and Data Protection Manager. With additional supports for Windows Server 2003/2008 environments, solution focuses on data reduction for application and nearline storage....Read More »
The Ultimate Guide to Powder Coating
This white paper provides an overview guide to powder coating, a three stage process including pretreatment, application and curing.Read More »
Security Software turns USB flash drive into personal vault.
With Encrypt Fox v1.00, users can create unlimited invisible encrypted vaults on unlimited number of computers, CDs, DVDs, or removable hard drives. Military wipe function renders no footprint once file has been deleted from host computer. Acting as personal key to computer, program provides protection from identity theft, viruses, hackers, and phishers. Software runs only from USB flash drive...Read More »
Data Protection Software suits Mac and Linux enterprise users.
Providing whole disk encryption, PGP-® Desktop enables client compliance across all major desktop operating system environments, including Windows, Mac OS X, Ubuntu Linux, and Red Hat Linux. Program supports Boot Camp, so users can have complete protection for machines running dual Mac OS X and Windows environments. Optimized for solid state drives, software includes encrypt and sign button in...Read More »
Mobile Armor Announces General Availability of DriveArmor v3.0 - Centrally Managed Self-Encrypting Drives
Data Encryption Provider Teams with Seagate to Deliver Self-Encrypting Disk Drives for Desktop and Laptop Computers ST. LOUIS, -- Mobile Armor, Inc., a leader in data protection and encryption, today announced the general availability of DriveArmor(TM) v3.0, an enterprise-class solution for access control and managing security on laptop and desktop computers with groundbreaking 2.5-inch...Read More »
Authenticators are based on public key infrastructure.
Suited for local and remote access to corporate network and applications, DIGIPASS-® KEY 200 consists of USB device with PKI smart card and secure USB mass storage on single device. DIGIPASS-® KEY 860, adapted for banking environments, combines smart card ID device, OTP authenticator, and secure USB storage. Both offer PKI-based digital signature for emails or transactions, encryption...Read More »
Inline Encryptors meet government encryption demands.
Providing FIPS 140-2 Level 2 encryption, 3e-636S Series supports mission-critical demands of civilian and military government applications. Devices enable Federal agencies seeking to deploy Secure WLANs to comply with Federal regulations, including DOD 8100.2. While 3e-636S-2 is complete plug-and-play cryptographic module that connects to network via Ethernet port, 3e-636S-1 is component that can...Read More »
IBM Introduces Products and Services to Combat New Security Threats
New Services, Software and Hardware from IBM drive greater visibility and security for Cloud computing, Data and Web applications SAN FRANCISCO, April 21 -- Today, at the RSA Conference, IBM (NYSE:IBM) introduced new services, hardware and software aimed at improving the security of cloud computing environments, helping ensure the confidentiality of data and helping locking down applications from...Read More »
Sentry Equipment Introduces New Compact Hygienic Automatic Sampler
As a leader in industrial sampling equipment at Sentry Equipment, our success is built on a history of innovation and designs that epitomize value and efficiency. The new Hygienic Automatic Sampler is another example of our dedication to developing quality engineered products. To learn how this product can streamline the sampling process for dry, free-flowing materials, see our new video.Read More »