Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

5/19/2011
01:16 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ThinkCP Technologies Announces ThinkTankIQ FEDS-SGARD Secure Workstations

Each FEDS-SGARD client workstation features FIPS 140-2 Encrypted Data Storage

IRVINE, Calif., May 19, 2011 /PRNewswire/ -- Today, ThinkCP(TM) Technologies announced their latest addition to the successful line-up of Think FEDS(TM) products; ThinkTankIQ(TM) FEDS-SGARD(TM) Secure Workstations, designed to help prevent "Malicious Insider" attacks. Each FEDS-SGARD client workstation features FIPS 140-2 Encrypted Data Storage (FEDS), USB port blocks, device interlocks, enclosure anchor locking, tamper seals and optional smart card readers. ThinkCP (TM) Technologies, an Intel Technology Provider Platinum, develops, integrates, tests and "burns-in" the Intel-Processor based ThinkTankIQ FEDS-SGARD Secure Workstations in their ISO 9001:2008 QMS Accredited facilities based in the USA.

IT Managers have become aware of the genuine threat posed by malicious insider attacks in the wake of events such as WikiLeaks, but many enterprise infrastructures remain at risk based on common vulnerabilities found in client workstations. By implementing the latest FEDS-SGARD Secure Workstations, IT Managers are better equipped to prevent actions that often lead to data theft, data corruption and potential liabilities. In addition, organizational policies and legal requirements can now be enforced by physical barriers integrated within the client workstations.

ThinkCP is releasing 3 different FEDS-SGARD systems, with the option of custom builds based on customer requirements and preferences. "Staging" or application testing may also be provided. Customers interested in custom designs and testing should contact Think FEDS Product Manager Craig Resnick. Detailed options and specifications are available at http://www.thinkcp.com/products/FEDS_Workstations.asp

The ThinkTankIQ FEDS-SGARD secure client workstations are available to federal, commercial and educational institutions. U.S. Federal customer may purchase the systems via ThinkCP's GSA Contract. Customers interested in purchasing should contact ThinkCP directly at (800) 726-2477 or (949) 833-3222 (International).

About ThinkCP(TM) Technologies

Founded in 1987 and headquartered in Irvine, California, ThinkCP(TM) Technologies is an ISO 9001:2008 QMS accredited technology company specializing in custom design, integration and assembly of high-performance computing and storage solutions centered around the needs of enterprise class customers throughout the world. ThinkCP partners with the industry's leading technology companies, service providers and channel partners to deliver comprehensive solutions.

ThinkCP(TM), ThinkCP Technologies(TM), H. Co. Computer Products, Inc.(TM), ThinkTankIQ(TM), Think FEDS-SGARD(TM) the respective logos and combinations thereof are trademarks or registered trademarks of H. Co. Computer Products. Other product names used herein are for identification purposes only and may be the respective trademarks of other companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...