Attacks/Breaches
5/30/2007
07:16 AM
50%
50%

BeCrypt to Talk Securing Workers

BeCrypt will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit

ANNAPOLIS, Md. -- BeCrypt, a leading supplier of data protection and encryption products will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit. Trusted Client provides a safe, configurable operating system that fits on a USB thumb drive, for secure use in un-managed environments. In addition, Dr. Bernard Parsons, Chief Technology Officer at BeCrypt will be giving a presentation at the Summit discussing the business issues of remote working, and how they can be overcome. The presentation takes place in Theatre A within the Solution Showcase, at 12.35pm on Monday, June 4th.

Dr. Parsons will be talking in some depth about the concerns around Business Continuity, and how the costs of flexible working are creating a growing requirement for employees to occasionally work remotely, using computers that are not owned or managed by the enterprise. The level of trust that can be placed in such machines is limited, and the threats resulting from their use are significant. Dr. Parsons examines approaches to creating a secure environment on unmanaged machines.

BeCrypt’s Trusted Client, being shown for the first time in the USA, enables a trusted environment on an untrusted host and can be used for thin-client applications, web or email access or for stand-alone applications. All information on the USB thumb drive, including the operating system, is encrypted and protected with boot time authentication to ensure confidentiality and integrity of data.

Trusted Client provides increased flexibility enabling secure access and work from any computer in any location. It reduces costs by removing the need for laptops, providing remote access to systems and removing the need for two computing systems where users work at different levels of security classification.

Steven Bessellieu, CEO of BeCrypt Inc said, “BeCrypt is proud to be a sponsor of the Gartner IT Security Summit. My colleague Dr. Parsons has been instrumental in developing new products for the data security market for many years and has many insights into the business issues of providing access to sensitive enterprise data. Dr. Parsons will also be available throughout the Summit to further discuss the issues raised in the presentation and to offer innovative solutions.”

BeCrypt Ltd.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.