CREDANT Removes Major Roadblock to Cloud Adoption through Unique Data Encryption Approach

 London —February 17, 2011—CREDANT Technologies, the trusted experts in data protection, today announced immediate availability of the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. The new CREDANT cloud security platform provides enterprise customers with the ability to more rapidly embrace cloud infrastructure by removing the primary roadblock to adoption – data security. With this launch, CREDANT enables organizations to control and enforce security whether corporate data is located in private, hybrid or public cloud infrastructures. The CREDANT cloud security platform provides the only cloud data security approach to enable granular encryption, access control and key management that allows enterprises, including the cloud provider itself.

Read more: CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLOUD ENCRYPTION SOFTWARE

ANDOVER, Massachusetts, February 15, 2011 – Napatech today announced the introduction of a new software suite that promises to make network appliance development both faster and simpler. The Napatech Software Suite also includes critical functionality that can accelerate performance of network appliances.   The Napatech Software Suite provides both a hardware abstraction and streamlined Application Programming Interface (API) that allows network appliance vendors to quickly and easily take advantage of Napatech’s full range of intelligent network adapters.   Hardware abstraction allows multiple intelligent network adapters of different types to be combined on a plug-and-play basis in a standard server platform. The same feature set can be offered independent of the port speed allowing flexible 1 G and 10 G port combinations that can be changed as required.

Read more: New Napatech Software Accelerates Appliance Development

February 15th 2011 - Publishing Technology plc(LSE: PTO), the largest provider of software and services to the publishing industry, today opened a Paris office which will provide on the ground support to the French market.

Publishing Technology, which services eight out of ten of the world's largest publishers, already has offices in the UK (Oxford and Bath), the USA (Cambridge, MA, and Somerset, NJ), Brazil (São Paulo) and Australia (Sydney), and will open an office in India (New Delhi) in March.

The new Paris office will help consolidate Publishing Technology’s activities in France, and form a local sales and support structure for the wide mix of products and services the group provides.

Read more: Publishing Technology opens French office

Abingdon, United Kingdom, 14th February 2011 – Toumaz, the leading provider of ultra-low energy wireless telemetry technologies for medical monitoring and internet-connected consumer devices, will be demonstrating its latest ultra-low energy wireless SoC TELRAN at Embedded World 2011 in Germany.

 

The Embedded World exhibition and conference takes place on 1 – 3 March 2011 at the Exhibition Centre NürnbergMesse. Embedded World is the World’s biggest exhibition of its kind and the meeting place of the international embedded community. The event showcases modern, leading-edge ideas and solutions to global challenges for which engineers and especially the developers of embedded systems bear special responsibility. The accompanying conference is the leading European event for the embedded industry and covers all fields of embedded system development. Toumaz will be exhibiting at the event for the first time and will be located at Stand 367 (Hall 12). On the show floor, attendees will be able to see demonstrations of Toumaz’s innovative products, including wireless 3 axis accelerometer using the TZ1053TDK boards at 868MHz.

Read more: Toumaz to exhibit at Embedded World 2011, Germany

10th February 2011 - The recently published 2011 CyberSecurity Watch Survey claims to show that 21 per cent of attacks on organisations are caused by insiders.

 And, says Amichai Shulman, chief technology officer with data security specialist Imperva, the report also points out that the percentage of those viewing the insider attacks as more costly is up this year (33 per cent) on the 25 per cent reported last year.

 

"The report is also very interesting as it defines an insider as being an employee or contractor with authorised access, as well as noting that these types of attacks are becoming more sophisticated, where the user employs different Rootkits and hacking tools" he added. This is a significant shift, as so far insider attacks used to rely on very simple techniques and tools (available with any work station).

Read more: Imperva warns on the real insider security threat