Tags : authentication


Aladdin Knowledge Systems-IriTech Inc.


[October 29, 2009] Counting successful corporations and national security agencies among its customers, IriTech Inc. manufactures biometric authentication equipment and software based on iris recognition. To maintain its unique position in the growing biometrics market and prevent reverse engineering of their software, IriTech knew it would need to make software rights management an important part of its overall business plan. They began searching for a solution that would meet their needs. Read More...

Tags: authentication , security , vertical , DRM , marketing

IBM - The International Bank of Miami


[February 17, 2009] The bank used a password-based authentication method that needed to be replaced because it was too complicated and difficult to manage.A solution including Secure Systems Authentication, a fingerprint recognition device, was implemented with IBM DB2 for i5/OS. Read More...

Tags: authentication , server , software , IBM , international

Integrator Capitalizes on Growing IP Storage Opportunity


[January 26, 2009] Convergint Technologies strikes strategic alliance with IP video storage vendor Intransa to capitalize on growth of external storage market. Popularity of video surveillance is a factor. Read More...

Tags: video , authentication , Convergint Technologies , physical security , Storage

IBM Teams with Channel Partners to Improve Digital Security


[November 17, 2008] The vendor is working with key partners to expand its strategy for authentication to enterprise businesses and other vertical markets such as government and health care. Read More...

Tags: authentication , services , IBM , data security

Stormy Weather Hits Amazon's Cloud


[July 22, 2008] Amazon's S3 service ran into some stormy weather on Sunday when technical glitches knocked the company's "cloud" storage offline for several hours. The mishap underscores what could become a growing problem for channel partners who move too rapidly into the increasingly popular world of cloud computing. Read More...

Tags: Amazon , authentication , services , software , Storage

Oracle Patches 45 Vulnerabilities


[July 16, 2008] BEA joins the quarterly roundup of Oracle critical patch updates. Read More...

Tags: Oracle , authentication , security , server , CVE

Elite Channel Program Highlights Enterprise Data Security Solutions


[April 27, 2008] Credant Technologies moves to expand channel business by launching premier program targeting high-end partners Read More...

Tags: authentication , security , data protection , Enterprise

Channel Is Key In Enterprise Security Sales


[April 06, 2008] George Adams, CEO of SSH Communications Security, outlines the key obstacles channel partners face in tackling security sales and offers a roadmap to success. Read More...

Tags: Linux , authentication , Windows , security , data , search , services , Microsoft , server , consumer , management , support , IBM , Specification , Demo , PC , IT , Internet , research , marketing , privacy , ERP , laptops , Office , malware , CA , government , virus , Enterprise , OS , technology , RIM , business , news , SEC , corporate , VAR , protocols , standards , regulation , OSI , REV , EFF , vulnerabilities , SCO

Firefox Update Tackles Pair of Critical Bugs


[March 26, 2008] Mozilla plugs holes while the march continues toward Firefox 3. Read More...

Tags: open source , authentication , security , Firefox , Mozilla


Click the Join button below to sign up to our newsletter!