European Reseller

Helping bring new products to market

Monday, Jul 14th

Last updateFri, 16 Jun 2023 8am

You are here: Home Security
Hand Held

Security Threat and Multi-Factor Authentication

Zero-Day Security Threats Give Rise to Next-Generation Multi-Factor Authentication

   threat development web

Here Claus Rosendal of SMS PASSCODE explains more

Read more: Security Threat and Multi-Factor Authentication

Edward Snowdon and the RSA receiving $10 million for a back door with NSA

Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products


Back door .reutersmedia.net
A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/

Credit: Reuters

Read more: Edward Snowdon and the RSA receiving $10 million for a back door with NSA

Delivering M2M Security Within Encrypted Networks

Delivering M2M Security Within Encrypted Networks

 As cloud services explode in popularity, enterprises are increasingly turning to their channel partners for governance and visibility options that enable them to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. For the most part, those solutions today mainly take the form of enterprise identity and access management (IAM) strategies, which are generally effective in managing the identities assigned to interactive, human users.

J.Lewis WEB 

Jonathan Lewis, director of product marketing, SSH Communications Security

Read more: Delivering M2M Security Within Encrypted Networks

Best Practices for Secure Shell Key Management

Tatu Ylonen WEB CEO  founder SSH Comunications 

By Tatu Ylönen, CEO and founder, SSH Communications Security

Over the years, large enterprises have seen an increase in the number of security threats they have encountered.

Read more: Best Practices for Secure Shell Key Management

A Great time was had at the InfoSecurity Russia

Now InfoSecurity Russia Show 2013 is over it was held  25-27th September, Moscow, Crocus Expo, Pavilion 2. Don’t miss opportunity to register free of charge to 2014 Exhibition and conference

Infosecurity Russia groteck

Read more: A Great time was had at the InfoSecurity Russia

Infoseurity Russia 2014 A review as we look forward to 2014

Attempts to transfer infrastructure particularly or completely to the side of outsourcing service provider or in Cloud lead to the fact:

The management of a company’s IT-infrastructure is becoming a weak spot, which makes it difficult not only supporting existing systems and architectures, but also it doesn’t allow introduction of new solutions

.Ekaterina Kvitkovskaya Marketing Manager kvit

Ekaterina_Kvitkovskaya Marketing Manager

Read more: Infoseurity Russia 2014 A review as we look forward to 2014

examples of malware that would be most damaging

These are some examples of malware that would be most damaging to your business

gn2000

 

Viruses, Ransomware, Spyware,

Viruses: A kind of self-replicating software that will eventually slow down and cripple your computer systems which will inevitably destroy or alter data held on them.

Read more: examples of malware that would be most damaging

Mayflex to Distribute Siemens Access Control - Aliro Range

Cabling infrastructure company Mayflex  a network and security solutions distributor, has signed an agreement to distribute the Aliro range from Siemens.

Aliro is a simple flat system architecture with easy-to-use web based software and  mobile applications.  Offering a flexible  approach to Access Control it enables system management from almost any device with Internet access.

Siemens Aliro

Read more: Mayflex to Distribute Siemens Access Control - Aliro Range

Multi-Factor Authentication: What’s in a Name?

The risks of deploying "good enough" security measures and how organisations can take the necessary steps to ensure they are properly securing remote access systems.

Comparison is a valuable tool in the decision-making process if you are comparing “apples to apples,” as they say. If you were looking for a new mobile phone, for instance, you would look at mobile phones on the market and compare them by screen size, storage capacity and other features important to you. You would not, however, include a rotary phone in your comparison shopping. Even though both make calls and are referred to as a  “phone,” that’s where the similarities end.

david hald lowWEB  GPO RotaryPhone 200fw256fh187

Here we have a view from David Hald

Read more: Multi-Factor Authentication: What’s in a Name?