Attacks/Breaches
5/30/2007
07:16 AM
50%
50%

BeCrypt to Talk Securing Workers

BeCrypt will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit

ANNAPOLIS, Md. -- BeCrypt, a leading supplier of data protection and encryption products will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit. Trusted Client provides a safe, configurable operating system that fits on a USB thumb drive, for secure use in un-managed environments. In addition, Dr. Bernard Parsons, Chief Technology Officer at BeCrypt will be giving a presentation at the Summit discussing the business issues of remote working, and how they can be overcome. The presentation takes place in Theatre A within the Solution Showcase, at 12.35pm on Monday, June 4th.

Dr. Parsons will be talking in some depth about the concerns around Business Continuity, and how the costs of flexible working are creating a growing requirement for employees to occasionally work remotely, using computers that are not owned or managed by the enterprise. The level of trust that can be placed in such machines is limited, and the threats resulting from their use are significant. Dr. Parsons examines approaches to creating a secure environment on unmanaged machines.

BeCrypt’s Trusted Client, being shown for the first time in the USA, enables a trusted environment on an untrusted host and can be used for thin-client applications, web or email access or for stand-alone applications. All information on the USB thumb drive, including the operating system, is encrypted and protected with boot time authentication to ensure confidentiality and integrity of data.

Trusted Client provides increased flexibility enabling secure access and work from any computer in any location. It reduces costs by removing the need for laptops, providing remote access to systems and removing the need for two computing systems where users work at different levels of security classification.

Steven Bessellieu, CEO of BeCrypt Inc said, “BeCrypt is proud to be a sponsor of the Gartner IT Security Summit. My colleague Dr. Parsons has been instrumental in developing new products for the data security market for many years and has many insights into the business issues of providing access to sensitive enterprise data. Dr. Parsons will also be available throughout the Summit to further discuss the issues raised in the presentation and to offer innovative solutions.”

BeCrypt Ltd.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
8 Key Building Blocks for Enterprise Network Defense
Networks are changing rapidly -- and so are strategies for protecting them. This Tech Digest looks at the fundamentals for the next-gen environment.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In this episode of Dark Reading Radio, veteran CISOs will share their experience and insight into how organizations can get the best bang for their security buck.