Risk
10/25/2007
12:44 PM
Tom Smith
Tom Smith
Commentary
50%
50%

Interop Winners: Desktop Conferencing, Deep Security

It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.

It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.Most interesting technology: Desktop videoconferencing system from Avistar Communications that can be delivered on a hosted or licensed basis, and integrates with major desktop applications such as IM to include a critical presence element. Want to initiate a video call? Connect with your co-worker or partner in IM, and kick things off. The video quality is excellent, and the system integrates with room-based systems for those companies that have a huge investment in old-line VC technology that may be underutilized. Avistar's system makes videoconferences more accessible to a larger number of employees and desktops within a big company. Avistar touts major financial firms as multi-thousand-seat customers. Avistar President Simon Moss estimates Avistar's network and systems will carry 50 million minutes of usage this year and an expectation of 90 million minutes in 2008.

Most desperately needed technology: The list of data loss/data breach incidents grows every week. Now there are claims that the granddaddy of them all, TJX, is twice as large as the company has been reporting, with 94 million affected accounts. Stepping up to the plate with security technology that locks down laptops, mobile phones and more is a company called Mobile Armor that's making inroads into U.S. military and other government agencies. Its products range from a Policy Server to set and enforce security policies, to tools to encrypt files and folders on removable media devices, to software for pre-boot authentication and full disk encryption on laptops. The company has unique insights into the most intensive data protection requirements. Director of technical services Matt Brickey related the story of certain military applications in Iraq where three failed password attempts will result in a laptop's hard drive being erased. Which leads me to the...

Most startling stat I heard: One New York-based financial services firm loses one laptop per day and five smartphones per day in taxicabs, says John Pironti, chief information risk strategist for the consulting firm Getronics. A common outcome: The cab companies sell off the gear after 30 days. How that's for risky business?

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.