Security News

HID Global and Fidesmo join forces to add contactless access control to wearables
2020-04-26 23:30

HID Global, a worldwide leader in trusted identity solutions, announced a collaboration with Fidesmo, a provisioning company that makes it possible to connect contactless services to wearables. "As wearables grow in popularity, organizations of all types will be confronted with the need to support new form factors for physical access and other popular applications," said Steve Currie, VP and Managing Director of Extended Access Technologies with HID Global.

HID Global launches HID Signo, its signature line of access control readers
2020-03-04 04:00

HID Global, a worldwide leader in trusted identity solutions, announced the launch of HID Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today's dynamic environments and set organizations up for smarter, more connected access control.

Live Webinar | Who's In Your Cloud? How Privileged Access Controls are Leaving You Exposed
2020-01-28 16:48

Compliance is putting pressure on how organizations manage privileged access on these systems, which are storing petabytes of user and customer data. The nature of Linux makes it very hard to understand who is in your cloud at any given moment - resulting in breach detection times of over 200 days.

Zero Trust: Beyond access controls
2020-01-23 06:30

One common misconception: Zero Trust is all about access controls and additional authentication, such as multi-factor authentication. While these two things help organizations get to a level of Zero Trust, there is more to it: a Zero Trust approach is really an organization-wide architecture.

Micro Focus AD Bridge 2.0: Extending security policies and access controls to cloud-based Linux
2020-01-17 02:30

Micro Focus released Micro Focus AD Bridge 2.0, offering IT administrators the ability to extend Active Directory controls from on-premises resources, including Windows and Linux devices to the cloud - a solution not previously offered in the marketplace. With AD Bridge 2.0, organizations can leverage existing infrastructure authentication, security as well as policy, in order to simplify the migration of on-premises Linux Active Directory to the cloud, resulting in fully secured and managed Linux virtual machines in the cloud.

3D sensing platform for access control and smart video security announced
2020-01-06 11:18

Ambarella and ON Semiconductor announced a joint 3D sensing platform for the development of intelligent access control systems and smart video security products such as smart video doorbells and door locks. "Lumentum has worked to enable diverse applications of our VCSEL technology into next-generation 3D sensing products," said Dr. Andre Wong, vice president, product line management, 3D Sensing at Lumentum.

OPSWAT Acquires Network Access Control Provider Impulse
2019-12-13 16:50

Critical infrastructure protection company OPSWAT has acquired Network Access Control (NAC) and Software Defined Perimeter (SDP) solutions provider Impulse. read more

G Suite admins get context-aware access controls, rule-based automated actions and alerts
2019-10-30 11:53

Google is rolling out new security capabilities for G Suite Enterprise administrators, allowing them to implement context-aware access controls for users and to create rules to automate actions...

Cobalt Iron’s Cyber Shield locks down data access control, greatly reducing financial risk
2019-09-12 02:30

Cobalt Iron announced Cyber Shield, an extension of its Adaptive Data Protection SaaS solution that locks down and shields its customers’ backup data from loss, corruption, or attack. Cyber Shield...

A look at the global network access control market
2019-08-27 03:30

The network access market reached a valuation of ~ $953 million in 2018, according to Fact.MR. The continuous evolution of information security parameters is likely to warrant new opportunities...