Attacks/Breaches
5/30/2007
07:16 AM
Connect Directly
RSS
E-Mail
50%
50%

BeCrypt to Talk Securing Workers

BeCrypt will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit

ANNAPOLIS, Md. -- BeCrypt, a leading supplier of data protection and encryption products will be debuting its latest product Trusted Client in the US at the Gartner IT Security Summit. Trusted Client provides a safe, configurable operating system that fits on a USB thumb drive, for secure use in un-managed environments. In addition, Dr. Bernard Parsons, Chief Technology Officer at BeCrypt will be giving a presentation at the Summit discussing the business issues of remote working, and how they can be overcome. The presentation takes place in Theatre A within the Solution Showcase, at 12.35pm on Monday, June 4th.

Dr. Parsons will be talking in some depth about the concerns around Business Continuity, and how the costs of flexible working are creating a growing requirement for employees to occasionally work remotely, using computers that are not owned or managed by the enterprise. The level of trust that can be placed in such machines is limited, and the threats resulting from their use are significant. Dr. Parsons examines approaches to creating a secure environment on unmanaged machines.

BeCrypt’s Trusted Client, being shown for the first time in the USA, enables a trusted environment on an untrusted host and can be used for thin-client applications, web or email access or for stand-alone applications. All information on the USB thumb drive, including the operating system, is encrypted and protected with boot time authentication to ensure confidentiality and integrity of data.

Trusted Client provides increased flexibility enabling secure access and work from any computer in any location. It reduces costs by removing the need for laptops, providing remote access to systems and removing the need for two computing systems where users work at different levels of security classification.

Steven Bessellieu, CEO of BeCrypt Inc said, “BeCrypt is proud to be a sponsor of the Gartner IT Security Summit. My colleague Dr. Parsons has been instrumental in developing new products for the data security market for many years and has many insights into the business issues of providing access to sensitive enterprise data. Dr. Parsons will also be available throughout the Summit to further discuss the issues raised in the presentation and to offer innovative solutions.”

BeCrypt Ltd.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.