Attacks/Breaches
5/30/2007
07:16 AM
50%
50%

BeCrypt to Talk Securing Workers

BeCrypt will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit

ANNAPOLIS, Md. -- BeCrypt, a leading supplier of data protection and encryption products will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit. Trusted Client provides a safe, configurable operating system that fits on a USB thumb drive, for secure use in un-managed environments. In addition, Dr. Bernard Parsons, Chief Technology Officer at BeCrypt will be giving a presentation at the Summit discussing the business issues of remote working, and how they can be overcome. The presentation takes place in Theatre A within the Solution Showcase, at 12.35pm on Monday, June 4th.

Dr. Parsons will be talking in some depth about the concerns around Business Continuity, and how the costs of flexible working are creating a growing requirement for employees to occasionally work remotely, using computers that are not owned or managed by the enterprise. The level of trust that can be placed in such machines is limited, and the threats resulting from their use are significant. Dr. Parsons examines approaches to creating a secure environment on unmanaged machines.

BeCrypt’s Trusted Client, being shown for the first time in the USA, enables a trusted environment on an untrusted host and can be used for thin-client applications, web or email access or for stand-alone applications. All information on the USB thumb drive, including the operating system, is encrypted and protected with boot time authentication to ensure confidentiality and integrity of data.

Trusted Client provides increased flexibility enabling secure access and work from any computer in any location. It reduces costs by removing the need for laptops, providing remote access to systems and removing the need for two computing systems where users work at different levels of security classification.

Steven Bessellieu, CEO of BeCrypt Inc said, “BeCrypt is proud to be a sponsor of the Gartner IT Security Summit. My colleague Dr. Parsons has been instrumental in developing new products for the data security market for many years and has many insights into the business issues of providing access to sensitive enterprise data. Dr. Parsons will also be available throughout the Summit to further discuss the issues raised in the presentation and to offer innovative solutions.”

BeCrypt Ltd.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

CVE-2014-6132
Published: 2014-12-24
Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.3 through 6.3.0.5, 7.0.x through 7.0.0.5, 7.5.x through 7.5.0.4, 8.0.x before 8.0.0.3, and 8.5.x before 8.5.0.1 allows remote authenticated users to inject arbitrary web script or HTML vi...

CVE-2014-6153
Published: 2014-12-24
The Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.3.x through 6.3.0.5, 7.0.x through 7.0.0.5, 7.5.x through 7.5.0.4, 8.0.x before 8.0.0.3, and 8.5.x before 8.5.0.1 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.