Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/25/2007
12:44 PM
Tom Smith
Tom Smith
Commentary
50%
50%

Interop Winners: Desktop Conferencing, Deep Security

It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.

It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.Most interesting technology: Desktop videoconferencing system from Avistar Communications that can be delivered on a hosted or licensed basis, and integrates with major desktop applications such as IM to include a critical presence element. Want to initiate a video call? Connect with your co-worker or partner in IM, and kick things off. The video quality is excellent, and the system integrates with room-based systems for those companies that have a huge investment in old-line VC technology that may be underutilized. Avistar's system makes videoconferences more accessible to a larger number of employees and desktops within a big company. Avistar touts major financial firms as multi-thousand-seat customers. Avistar President Simon Moss estimates Avistar's network and systems will carry 50 million minutes of usage this year and an expectation of 90 million minutes in 2008.

Most desperately needed technology: The list of data loss/data breach incidents grows every week. Now there are claims that the granddaddy of them all, TJX, is twice as large as the company has been reporting, with 94 million affected accounts. Stepping up to the plate with security technology that locks down laptops, mobile phones and more is a company called Mobile Armor that's making inroads into U.S. military and other government agencies. Its products range from a Policy Server to set and enforce security policies, to tools to encrypt files and folders on removable media devices, to software for pre-boot authentication and full disk encryption on laptops. The company has unique insights into the most intensive data protection requirements. Director of technical services Matt Brickey related the story of certain military applications in Iraq where three failed password attempts will result in a laptop's hard drive being erased. Which leads me to the...

Most startling stat I heard: One New York-based financial services firm loses one laptop per day and five smartphones per day in taxicabs, says John Pironti, chief information risk strategist for the consulting firm Getronics. A common outcome: The cab companies sell off the gear after 30 days. How that's for risky business?

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.