Receive industry and products news from the market categories that matter to you most.
Stay up to date on industry news and trends, product announcements and the latest innovations.
Safety & Security Software
Compatible with Lascar's EL-21CFR-2-LCD Temperature, Humidity and Dew Point Datalogger, EasyLog 21-CFR v7.4 allows users to store data in compliance with 21CFR Part 11 regulations. Readings collected from logger are stored in encrypted format which cannot be edited. In addition, software provides full audit trail of activities and actions taken, with users being able to add comments to... Read More
Influential Nomination Recognizes 16 Leading Cybersecurity Pioneers CUPERTINO, Calif. and MCLEAN, Va. - TaaSera Inc., the leading provider of preemptive breach detection for cybersecurity, today announced its selection as one of the 2015 SINET 16 Innovators. Chosen from a pool of 122 candidates, TaaSera is one of 16 elite companies selected to present at the SINET Showcase. With nine out of ten... Read More
Next-generation infusion system offers expanded drug library and EMR interoperability LAKE FOREST, Ill. –Â Hospira, Inc. (NYSE: HSP), the world's leading provider of injectable drugs and infusion technologies, today announced the first installation of the Plum 360™ infusion system with Hospira MedNet™, at Shannon Medical Center in San Angelo, Texas. The Plum 360 infusion system,... Read More
Rockwell Automation and Cisco Launch New Architectures to Reduce Security Risks in Industrial Automation EnvironmentsJul 01, 2015
MILWAUKEE, — As industrial markets evolve to unlock the promise of the Internet of Things (IoT), Rockwell Automation and Cisco today are announcing new additions to their Converged Plantwide Ethernet (CPwE) architectures to help operations technology (OT) and information technology (IT) professionals address constantly changing security practices. The latest CPwE security expansions, featuring... Read More
A truly flexible, easy to use and deploy authentication solution incorporating biometric "proof of presence" PALM BEACH GARDENS, Fla. -- Crossmatch(TM), a leading provider of multi-factor identity management and authentication solutions, today announced enhanced functionality of its DigitalPersona(Â® )Altus strong, multi-factor authentication solution.Â The enhancements build on the native... Read More
Absolute ManageÂ® v6.8Â enables IT administrators to manage operating system patches for Mac and Windows devices, along with a wide range of third-party applications, in fully automated system that detects and downloads missing patches. This is enabled via integrated automated patch engine that provides coverage and updates for most prevalent and at-risk third-party applications. Upon... Read More
Providing automated analysis and resolution of over 35 risks inherent to P-Card processes, P-Card Monitoring Solution helps expand P-Card usage while minimizing exposure to card misuse. Software includes Integrated Case Management for rectification of non-compliance, best-practice guides for controls and administration of P-Card programs, and dashboards that provide visibility into P-Card... Read More
Utilizing patent-pending algorithms, SmartTouch Advanced Fraud Prevention analyzes, detects, and prevents fraudulent financial transactions. Solution examines spending habits, historical patterns, and approver activity to identify anomalies and inconsistencies in transactions. After being automatically routed to authorized reviewer, transactions suspected for fraud are halted, while legitimate... Read More
Don't miss the latest news!
Receive industry and products news from the market categories that matter to you most.
Identity and Access Management Suite v9.0 includes Hitachi ID Mobile Access for Android and iOS, which enables access to all product features from phones and tablets.Â Along with dashboards and reports, features include ability to feed report output into requests to automate access remediation. Communication between user's device and on-premise IAM system is facilitated by cloud-hosted... Read More
VASCO Solutions Help Healthcare Service Providers Secure Access and Comply with Regulatory Requirements CHICAGO - VASCO Data Security International, Inc. (NASDAQ: VDSI), a global leader in authentication, digital signatures and identity management, will showcase its innovative data security solutions that help protect access to patient data and satisfy regulatory compliance at The HIMSS15 Annual... Read More
With encryption, key management, and access controls, Cloud Encryption Gateway helps enterprises secure sensitive data residing in Amazon Web Services (AWS) Simple Storage Service (S3) and Box environments. Data is encrypted before being saved to cloud storage; encryption keys and access policies are always under enterprise control. While gateway provides encryption and policy enforcement, paired... Read More
Conax will host a joint demonstration of ARRIS Spectrum SDC software and Conax multi-DRM in delivering next generation IP video SUWANEE, Ga.Â – ARRIS Group Inc. (NASDAQ: ARRS) and Conax today announced they will be demonstrating the joint capabilities of ARRIS's DASH repackaging and Conax's multi-DRM encryption at the annual NAB Show on April 13-16 in Las Vegas. The demo will... Read More
Demonstrations of the CYREN WebSecurity service available at booth #707 in Moscone South MCLEAN, Va. - CYREN (NASDAQ: CYRN) today announced its participation at RSA Conference 2015, where it will highlight the application of its unique cyber intelligence in the real-time threat mitigation and attack prevention capabilities of its CYREN WebSecurity service. Demonstrations will be available April... Read More
With idScanÂ® cloud-based offerings, companies can capture and verify customer's identity and critical personal information to optimize efficiency, security, and quality of customer interactions. Users can capture data from identity documents such as driver's licenses, passports, and medical insurance cards. Information is processed in cloud and data is then populated into integrated... Read More
Optionally available for CompletePBX IP-PBX Series of all-in-one appliances, CompleteSBC™ software provides security via intrusion prevention, acting as firewall for access control and Denial of Service. Program provides NAT traversal, smart routing, and messages repair to solve interoperability problems. As B2BUA server, CompleteSBC allows implementation of additional applications such as SIP... Read More
CYREN Cybersecurity Technology Chosen to Protect Joint Venture by Mitsubishi Heavy Industries and SiemensApr 06, 2015
MCLEAN, Va.Â – CYREN (NASDAQ: CYRN) today announced that UK-based Primetals Technologies, a joint venture by Mitsubishi Heavy Industries, Ltd. (MHI) and Siemens AG, selected CYREN's cloud-based cybersecurity technology to provide real-time protection from advanced cyberattacks, zero hour malware outbreaks, and hard-to-detect email threats, including viruses, phishing, spam and spyware.... Read More
Combining data collection, logic, and visualization, Orkos identifies critical credential theft risks in organizational networks. Solution identifies critical links that attackers will exploit inÂ major breach, immediate risks, as well as higher-order effects toÂ show total risk of credential theft. Credential assessment capability also supports remediation through simulation of network... Read More
Intralinks Signs Strategic Partnership Agreement to Provide Secure Content Collaboration Solutions in ChinaApr 03, 2015
Intralinks Partners with Beijing Shenzhou Xiangyun Technology Co Ltd. to provide sales, marketing, and support services in China NEW YORK and HONG KONGÂ – IntralinksÂ® Holdings, Inc. (NYSE: IL), a leading global provider of secure enterprise content collaboration solutions, and Beijing Shenzhou Xiangyun Technology Co Ltd, the cloud business affiliate of Digital China (Stock Code: 00861.HK),... Read More
Leveraging distributed agents, Contrast Enterprise enables vulnerability identification as applications run at enterprise scale. REST API and scriptable zero-configuration installers provide complete automation of application security into any software development life cycle, while 10+ information sources are used to discover vulnerabilities while eliminating false positives. Deployed and... Read More
S-series sensor extends real-time cybersecurity into all corners of organization, including such blind spots as remote sites and internal network segments, to automatically see indicators ofÂ cyber attack anywhere in network. Detection Triage functionality, included, lets security teams identify and track risky behaviors that can enable or obscure network attacks. Ability to customize and track... Read More