
Flat widescreen panel PC and industrial monitor with multitouch
DSM Computer has augmented its new ultra-slim panel PC family with the PN18-A2 widescreen model that provides a 47 cm (18.5 inch) TFT display with PCT multitouch screen and LED bac...
DSM Computer has augmented its new ultra-slim panel PC family with the PN18-A2 widescreen model that provides a 47 cm (18.5 inch) TFT display with PCT multitouch screen and LED bac...
Advantech introduces the UNO-4683, a new IEC 61850-3 and IEEE 1613 certified substation computer based on Intel’s Core i7 processor, and four new UNOP plug-in modules for Ethernet,...
Experience the NextAxxon Next is best-in-class, new-generation Video Management Software that is based on open standards to offer a truly open platform. Axxon Next’s reliability, p...
GE Security: Unix platform with web-deployable Java thin client cuts support costs. GE’s Security business announced that its Picture Perfect v4 Unixbased enterprise access control...
Cyber-Ark Software: a set of business practices to increase security. The World Cup seems to have consumed all of our lives for the past few months. Scapegoats have emerged and so ...
GIT-Interview with Bruce Schneier about Infosecurity. Bruce Schneier is an internationally renowned security technologist and author. His first bestseller, ‘Applied Cryptography’, ...
Innominate: safe and secure remote maintenance. Remote maintenance is much more cost effective then on-site maintenance. However, to enjoy all the benefits, companies need to prote...
Fraunhofer Institute SIT: perils of networked IT security - challenges and approaches. IT systems of companies and administrations are more and more networked. At the same time org...
Infosecurity Europe 2008 - advice on the latest IT security threats. Many technologies displayed at Reed Exhibitions’ Infosecurity Europe 2008 in the Olympia Grand Hall, London, in...
Fraunhofer Institute SIT: secure transportation of voice data. Voice-over-IP (VoIP) is on a triumphal course through the global business world. Analysts estimate a rate of growth i...
Siemens IT Solutions and Services: biometrics for safe banking over the internet. The popularity of online banking is on the rise. Initiating transactions from the comfort of your ...
Information Security Forum: how to protect sensitive data. Data losses put focus back on classifying and protecting sensitive data, says a new report from the Information Security ...
IEIMobile, the branded mobile solution provider established by IEI Technology Corp. (IEI), announced the launch of the AVL-3000, a highly integrated auto data server designed for a...
UK government data theft - do we need a Data Breach Notification? The theft of CDs containing the personal information of 25 million UK citizens has rightly caused an out-pouring o...
Geutebrück: online tool Interactive Specifier Library. Geutebrück has presented its online tool Interactive Specifier Library that promises to eliminate paperwork and drastically r...
Security-Center: new motordome series. Below the new motordome series, Security-Center places small and economic cameras for controllable video surveillance.Its Eyseo Ecoline PT-do...
Interflex: chip cards for acces control. Intelligent RFID chip cards from Interflex, using the innovative „Network on Card“ technology, allow users to identify themselves and updat...
CDVI: keypad KCIN with remote electronics. CDVI has unveiled its latest product in the Digicode range: the KCIN.This is a backlit, coded keypad in stainless steel with remote elect...
Cyber-Ark Software: how to select a Password Management System. Sometimes when I look at envelopes I understand technology. When I was a student in college, I worked in the server ...
SSH Communications Security: securing security against the "triple threat". Even the best IT security technologies are useless if someone possesses the “triple threat” – the will, ...
Data Encryption Systems: efficient risk management for data storage. In this article David Tomlinson, managing director for leading data security company, Data Encryption Systems (...
MB connect line offers a professional kit for worldwide safe remote maintenance. The mbNET Routers are the intelligent gateways between machine site and the Internet. They have an ...
Infosecurity Europe 2009. Many new technologies will be displayed at Reed Exhibitions’ Infosecurity Europe 2009 in London from April 28th to 30th. Last year the exhibition was big...
(ISC)2: software security. One can consider the information age as an extension of the industrial age, characterized by the focus on production of physical goods. Today, most manuf...
DSM Computer integrates the Intel AIM Suite in its industrial displaysIn close cooperation with Intel, DSM Computer has integrated the Intel AIM Suite Web-based software in its lar...
Intelligent, powerful, precise – the freely programmable absolute encoder in the AFS60/AFM60 EtherNet/IP family of products from SICK offers flexibility combined with fieldbus conn...
Advantech, a leading industrial communication solutions provider, has announced two new IP gateways; the EKI-1321 and 1322 GPRS have been designed to ensure that networks are alway...
eyevis’ new IP streaming video decoding solution offers the next generation of universal decoding of IP streams from cameras, encoders and DVRs over video IP networks. This fully d...
With the new LCD monitors type EYE-LCD-4700-24NB-IPD8, eyevis provides monitor with ebedded IP decoding solution. The deocder solution is based on eyevis NPX-IPD8 decoder unit for ...
The IPC PPC 12 from Mass may be used for visualization and operation of machine controls, for diagnosis, for data collection or communication purposes in industrial networks and fo...
Cellebrite,provider of mobile forensic solutions,announced the release of UFED Physical Analyzer, Version 2.0, a comprehensive software package update for its market-leading mobile...
The Matrox M-Series multi-display graphics cards render pristine images across up to eight high-resolution monitors at resolutions up to 2560 x 1600 for an exceptional multi-monito...
Protecting against the weakest linkWikiLeaks has come to international prominence (or notoriety, depending on your perspective) for its work in publishing private, secret and class...
Mobile TETRA, DECT and GSM terminals were in the focus of Funkwerk group's presentation at CeBIT. For the first time, three business units of the Funkwerk grouphad a joint presence...
Starting in November 2009, coordinated covert and targeted cyberattacks have been conducted against global oil, energy, and petrochemical companies. These attacks have involved soc...