Home » Posts tagged "Secure"

Emerson Network Power First to Earn EAL2+ Common Criteria Certification for Secure KVM Switch Series

Emerson Network Power First to Earn EAL2+ Common Criteria Certification for Secure KVM Switch Series











Huntsville, AL (PRWEB) August 10, 2011

Emerson Network Power, a business of Emerson and a global leader in maximizing availability, capacity and efficiency of critical infrastructure, today announced the Avocent SwitchView® SC600 and SC700 are the industry’s first secure KVM switches to receive EAL2+ Common Criteria certification. The certification extends a history of KVM leadership that began with the introduction of the secure KVM in 2000 and includes the first secure USB KVM switch and the first secure dual-head DVI switch.

Delivering secure access for any desktop environment with controlled USB connectivity, the next-generation secure switch series offers improved work efficiency while saving desktop space by eliminating redundant hardware and cables. Enhanced with the new profile certification that was introduced by the National Information Assurance Partnership (NIAP) in 2010, the switches enable the user to consolidate multiple workstations of varying security classification levels with one keyboard, monitor and mouse without compromising the network security.

“Being the first to market with EAL2+ certification marks another significant milestone and underscores our commitment to provide secure access for any desktop environment where security is mandatory while keeping pace with stringent government standards,” said Michael Helms, director of product management for Emerson Network Power’s Avocent business.

Both the Avocent SwitchView SC600 and SC700 switches feature multiple layers of security, including tamper-proof hardware security at the desktop. In addition, the secure switch ensures that only keyboard and mouse function on target computers by constantly monitoring all devices attached to the console ports. These switches ignore communication from all other USB devices (such as flash drives, hard disk drives, cameras and printers) when switching data to the target.

Common Criteria is an internationally recognized set of guidelines (ISO 15408), which define a common framework for evaluating security features and capabilities of information technology security products. The standard consists of several stringent predetermined evaluation assurance levels. To ensure consistency, vendor products are tested against a chosen level by an independent third-party testing laboratory.

The NIAP Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS), was established by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) to evaluate IT product conformance to international standards within the framework of the Common Criteria.

About Emerson Network Power

Emerson Network Power, a business of Emerson, is the global leader in enabling Business-Critical Continuity™ from grid to chip for telecommunication networks, data centers, health care and industrial facilities. Emerson Network Power provides innovative solutions and expertise in areas including AC and DC power and precision cooling systems, embedded computing and power, integrated racks and enclosures, power switching and controls, infrastructure management, and connectivity. All solutions are supported globally by local Emerson Network Power service technicians. Aperture and Avocent solutions from Emerson Network Power simplify data center infrastructure management by maximizing computing capacity and lowering costs while enabling the data center to operate at peak performance. For more information, visit http://www.Aperture.com, http://www.Avocent.com or http://www.EmersonNetworkPower.com.

About Emerson

Emerson, based in St. Louis, Missouri (USA), is a global leader in bringing technology and engineering together to provide innovative solutions for customers in industrial, commercial, and consumer markets through its network power, process management, industrial automation, climate technologies, and tools and storage businesses. Sales in fiscal 2010 were $ 21 billion. For more information, visit http://www.Emerson.com.

# # #









Attachments


















Vocus©Copyright 1997-

, Vocus PRW Holdings, LLC.
Vocus, PRWeb, and Publicity Wire are trademarks or registered trademarks of Vocus, Inc. or Vocus PRW Holdings, LLC.







More National Security Press Releases

Blackberry Email Too Secure for Governments

The governments of India and several other countries are demanding that Telecommunications Company and maker of the Blackberry mobile, Research In Motion, address security concerns. “If they don’t follow our guidelines, we will have no option but to ask them to stop their operations in India,” the Press Trust of India (PTI) quoted an unidentified government official as saying.

The Blackberry smartphone uses high encryption technology that Indian security forces are unable to intercept and decipher. Other governments that have recently expressed security concerns are Saudi Arabia, the UAE, Indonesia, Lebanon, Algeria and Germany. Saudi Arabia has ordered its phone operators to halt Blackberry services while the UAE plan to ban the services starting from October. France cautioned officials against using the service back in 2007.

Bans in both Saudi Arabia and the UAE means that domestic and International roaming travellers will not have access to Blackberry services.

The Canadian company has more than 41 million users world-wide, the percentage of those in the primary middle-eastern countries threatening to ban the use of Blackberry technology is less than 3 percent. There are around 700,000 Blackberry users in Saudi Arabia and some 500,000 in the UAE.

Government Compliance Vs Customer Privacy

RIM finds itself in a difficult situation: in order to do business in these countries who demand access to customer data, RIM will have to make a compromise with them or even cave completely to their demands. By capitulating to these governments however, RIM risks alienating its customers who value their privacy, especially its enterprise customers who fear having their confidential business transmissions read by governments.

While India is the latest country to express concerns that the encrypted Blackberry services will help facilitate terrorism, the battle between governments and communications companies over access to data has occurred over decades. In the 1980s, the US government unsuccessfully pushed for backdoor encryption keys and access to computer data. In 1994, the US passed CALEA (Communications Assistance for Law Enforcement Act) that allowed phone and electronic communications monitoring under certain circumstances, particularly in cases where national security is threatened. This was extended in 2005 to include Internet and VoIP phone systems.

Australia Settled This 20 years Ago, Until the War On Terror

Australia had a similar debate during the 1990s about the potential for encryption to thwart government from legitimately accessing communications and other data. The Australian government concluded at the time that they were powerless to intercept encrypted data. In 2004, The Australian Parliament approved the Surveillance Devices Bill (No. 2) 2004 and Telecommunications (Interception) Amendment (Stored Communications) Bill 2004, allowing easy access to emails, SMSs and voicemail by police. The spyware law authorises police to install spyware on user’s computers for offenses that carry penalties of 3 years, less than is required for a wiretap.

A Parliamentary Committee report cited a calculation that by comparison with the US for 2003-04, Australia issued 75% more warrants than the total number of US wiretap warrants, and that this represented 26 times the rate on a per capital basis.

Where There is a Will, There is a Way (to undermine surveillance)

Despite RIMs Blackberry service being the target of governments worried about terrorists being able to circumvent having their communications monitored, there is plenty of third party software available to encrypt data so that not even the government can intercept communications. A free app for Google’s mobile phone platform Andriod was recently released called RedPhone, a voice over Internet protocol (VoIP) program that encrypts phone calls, and TextSecure, an app for sending and receiving encrypted text messages and scrambling the messages stored in their inbox.

It would seem that despite any governments best efforts, those individuals who are knowledgeable of Internet security will get find a way around attempts to eavesdrop on their private conversations. The recent demand from these governments to be able to intercept and read Blackberry communications for the sake of national security sends the message that businesses cannot expect a right to privacy as communications providers are progressively forced into the unenviable position of choosing between customer privacy and legal compliance with regard to police and secret service surveillance.

Encryption is Legal Here and We Can Help

If the security of your business communications matters to you, getting the best data security advice is critical. There is also the task of navigating the balance between security and legal compliance. AWD can ensure that your business data is secure from all threats. For the best in data security services and consultation, contact an AWD security specialist today.AWD provide mobile and Internet security consultation and solutions for businesses in Australia.

Contact AWD for all your Internet security and network security needs.

AWD provide mobile and Internet security consultation and solutions for businesses in Australia.

Contact AWD for all your Internet security and network security needs.

Article from articlesbase.com

Find More National Security Articles

Secure Elements Advances to Evaluation Phase of Common Criteria Certification Process

Secure Elements Advances to Evaluation Phase of Common Criteria Certification Process










Herndon, VA (PRWEB) April 22, 2005

Secure Elements, Inc., a leader in enterprise vulnerability management and remediation, today announced that the company’s CLASS 5 Enterprise Vulnerability Management (C5 EVM) suite has advanced to the evaluation phase of Common Criteria certification, a security evaluation required by government procurement departments worldwide.

Common Criteria certification is an international standards program managed in the U.S. by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) and is designed to help government organizations select secure commercial IT products. It is also considered valuable by potential customers in the private sector.

Secure Elements is working toward Common Criteria’s Evaluation Assurance Level 3 (EAL 3). This level of certification assures customers, in and out of government, that Secure Elements’ systems have gone through a rigorous testing and analysis process and conform to IT security standards sanctioned by the International Standards Organization.

In progressing to the evaluation phase of the program, Secure Elements has completed two of only three steps required in the process and hopes to be certified by the end of the year.

“Common Criteria certification is important because it provides independent, standards-based verification of the security functions delivered by the C5 EVM suite,” said Ned Miller, president and CEO of Secure Elements. “Not only will this give our customers the highest level of confidence that our solutions deliver on their security promises, it also means that our solutions meet global security standards.”

About Secure Elements

Secure Elements is an enterprise vulnerability management leader, automating security remediation strategies and tactics across the entire enterprise, reducing business risk and IT management costs while improving systems performance and maintaining business continuity. Protecting mission critical and network infrastructure assets from both known and unknown attacks without limiting operational performance, the company rapidly identifies and intelligently responds to complex and diverse security incidents. Using real-time threat intelligence data and analysis, Secure Elements provides administrators with optimal security control across the enterprise. For more information, please visit http://www.secure-elements.com

Contact:

Elizabeth Maybach

SheaHedges Group

E-mail: emaybach@sheahedges.com

Direct: 703-287-7821

# # #







Attachments


















Vocus©Copyright 1997-

, Vocus PRW Holdings, LLC.
Vocus, PRWeb, and Publicity Wire are trademarks or registered trademarks of Vocus, Inc. or Vocus PRW Holdings, LLC.







Find More National Security Press Releases

MEDIA ADVISORY: Secure Elements’ Discusses IT Security’s Evolution to Enterprise Vulnerability Management at GFIRST National Conference

MEDIA ADVISORY: Secure Elements’ Discusses IT Security’s Evolution to Enterprise Vulnerability Management at GFIRST National Conference










(PRWEB) April 1, 2005

HERNDON, VA (PRWEB) April 1, 2005 – Secure Elements, Inc. invites conference attendees and media to a presentation by the Secure Elements chief technology officer at the GFIRST National Conference in Orlando, Fla., on April 7th, 2005.

Dan Bezilla will explore how enterprise vulnerability management supports the mission of the federal cyber security incident response functions.

WHO:    

Daniel Bezilla, Chief Technology Officer, Secure Elements, http://www.secure-elements.com

WHEN:

Thursday, April 7, 2005, 1:30 p.m. to 3 p.m., EST

WHERE:

2005 GFIRST National Conference, Rosen Centre Hotel, 9840 International Drive, Orlando, Fla.

WHAT:

Enterprise Vulnerability Management: Beyond Patch Management.

Patch management has never been a completely effective – or efficient – solution for IT security personnel. Each time a new patch is announced, managers must race to install and test the patch, usually in a race against hackers hoping to exploit the vulnerability. In addition, patch deployment usually disrupts network and application activity for hours and sometimes days.

Daniel B. Bezilla, co-founder and CTO of Secure Elements, is an information warfare expert and his past experience includes testing sensitive federal government computer systems. In this engaging address, he will discuss alternatives to traditional patch management and how CLASS 5 Enterprise Vulnerability Management software improves overall network security and eases the burden of manually updating patches through integration and automation.

HOW:

Members of the media may contact Elizabeth Maybach at 703-287-7821 or emaybach@sheahedges.com to obtain more information or schedule interviews with expert sources from Secure Elements.

About Secure Elements:

Secure Elements is an enterprise vulnerability management leader, automating security remediation strategies and tactics across the entire enterprise, reducing business risk and IT management costs while improving systems performance and maintaining business continuity. Protecting mission critical and network infrastructure assets from both known and unknown attacks without limiting operational performance, the company rapidly identifies and intelligently responds to complex and diverse security incidents. Using real-time threat intelligence data and analysis, Secure Elements provides administrators with optimal security control across the enterprise. For more information, please visit http://www.secure-elements.com

Contact:

Elizabeth Maybach

SheaHedges Group

703-287-7821

# # #







Attachments


















Vocus©Copyright 1997-

, Vocus PRW Holdings, LLC.
Vocus, PRWeb, and Publicity Wire are trademarks or registered trademarks of Vocus, Inc. or Vocus PRW Holdings, LLC.







More National Security Press Releases

How to Secure a Job With the Canadian Government

An ebook detailing how to find and secure a job with the Canadian Federal Government.
How to Secure a Job With the Canadian Government