Wed11142018

Last update01:56:20 PM GMT

Expert Witness : Technology

Red Lambda@s Metagrid Software Transforms Security Operations for Customers With Big IT, Network and Cloud Infrastructures

MetaGrid Leverages Grid Computing and Artificial Intelligence to Dramatically Increase the Scale, Speed and Efficacy of Security and Operational Intelligence for Companies with Big Data IT Challenges

   Red Lambda, Inc., a software company transforming security and operational intelligence for “Big Data” IT environments, today announced an Early Release Program for MetaGrid™ – next generation security and operational intelligence software powered by the company’s AppIron™ Grid Platform. MetaGrid is designed to address the Big Data dichotomy faced by providers of IT, network and cloud infrastructures that generate up to petabytes per day of operational data: Big Data can obscure security and operational threats and, at the same time, it can reveal opportunities to increase operational efficiency and unlock enormous business potential.  Red Lambda is the first to combine leading-edge Big Data technologies to create an ultra-scalable, purpose-built software platform designed to keep pace with the increasing volume, variety, and velocity of IT operational data and find the threats and opportunities buried within it.

Last Updated on Wednesday, 05 October 2011 09:44

Read more...

Infosecurity announce details for UK Autumn Virtual Conference

London, UK (23rd  September 2011) – Information security is one of the top priorities for businesses and organisations across the world and the Infosecurity 2011 UK autumn virtual conference, on the 27th September 2011 will cover all the key issues. The event will bring together a series of topical and informative sessions which will cover issues from security in businesses, to career advice on how to make progress in the information security profession. The free to attend event will feature a variety of speakers including - Professor John Walker from CAMM, Rolf von Roessing member of ISACA framework committee, Paul Simmonds Board member of Jericho Forum, Ray Stanton Global head of business continuity, security and governance at BT.  Also speaking at the conference is Bob Tarzey Analyst and director from Quocirca, Raj Samani EMEA Strategy Advisor at Cloud security alliance and CTO of McAfee, Chenxi Wang vice president at Forrester and Steve Durbin global vice president at ISF - all giving their insight into information security trends and how to keep your business up to date and secure. 

Read more...

Venafi report - 64% of organisations failing to encrypt data in the Cloud

Research Study discovers an epidemic of security worst practices

London 3rd August 2011 — Venafi, the inventor of and market leader in Enterprise Key and Certificate Management (EKCM) solutions, in conjunction with Echelon One, an IT security research leader specialising in security programs and guidance, today released the 2011 IT Security Best Practices Assessment. Echelon One led the effort to establish a set of 12 best practices and worked closely with Venafi to evaluate how well 420 enterprises and government agencies implemented them. The assessment reveals an epidemic of security worst practices, where a majority of organisations fail to adhere to simple data protection standards and, in many cases, are fully unaware of what security practices are currently in place.

Read more...

Digging for evidence

Your Expert Witness stolen jcbWith the aid of a Live Link tracking system and some Bear Grylls-like determination, Hewden, the national, multi-product hire specialist has successfully recovered a stolen excavator found buried deep in the undergrowth!

When the team at Hewden’s Dartford depot received an alert from Live Link telling them that one of its new JCB 3CX excavators had been taken, they jumped in to action.

Last Updated on Thursday, 28 June 2012 10:20

Read more...

Lieberman Software and Yubico partner to deliver stronger security in the wake of RSA token breach

Partnership Provides Improved Countermeasures against Threats like Token Breaches, Key Logging, Social Engineering and Other Attacks

 A new generation of regulatory compliance rules mandates the use of multi-factor authentication to ensure that only authorized IT staff are able to access an organization’s powerful privileged accounts.

Read more...