European Reseller

Helping bring new products to market

Friday, Apr 27th

Last updateMon, 09 Apr 2018 9am

You are here: Home Security
Hand Held

Security Threat and Multi-Factor Authentication

Zero-Day Security Threats Give Rise to Next-Generation Multi-Factor Authentication

   threat development web

Here Claus Rosendal of SMS PASSCODE explains more

Read more: Security Threat and Multi-Factor Authentication

Edward Snowdon and the RSA receiving $10 million for a back door with NSA

Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products


Back door .reutersmedia.net
A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/

Credit: Reuters

Read more: Edward Snowdon and the RSA receiving $10 million for a back door with NSA

Delivering M2M Security Within Encrypted Networks

Delivering M2M Security Within Encrypted Networks

 As cloud services explode in popularity, enterprises are increasingly turning to their channel partners for governance and visibility options that enable them to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. For the most part, those solutions today mainly take the form of enterprise identity and access management (IAM) strategies, which are generally effective in managing the identities assigned to interactive, human users.

J.Lewis WEB 

Jonathan Lewis, director of product marketing, SSH Communications Security

Read more: Delivering M2M Security Within Encrypted Networks

Best Practices for Secure Shell Key Management

Tatu Ylonen WEB CEO  founder SSH Comunications 

By Tatu Ylönen, CEO and founder, SSH Communications Security

Over the years, large enterprises have seen an increase in the number of security threats they have encountered.

Read more: Best Practices for Secure Shell Key Management

A Great time was had at the InfoSecurity Russia

Now InfoSecurity Russia Show 2013 is over it was held  25-27th September, Moscow, Crocus Expo, Pavilion 2. Don’t miss opportunity to register free of charge to 2014 Exhibition and conference

Infosecurity Russia groteck

Read more: A Great time was had at the InfoSecurity Russia

Infoseurity Russia 2014 A review as we look forward to 2014

Attempts to transfer infrastructure particularly or completely to the side of outsourcing service provider or in Cloud lead to the fact:

The management of a company’s IT-infrastructure is becoming a weak spot, which makes it difficult not only supporting existing systems and architectures, but also it doesn’t allow introduction of new solutions

.Ekaterina Kvitkovskaya Marketing Manager kvit

Ekaterina_Kvitkovskaya Marketing Manager

Read more: Infoseurity Russia 2014 A review as we look forward to 2014

Mayflex to Distribute Siemens Access Control - Aliro Range

Cabling infrastructure company Mayflex  a network and security solutions distributor, has signed an agreement to distribute the Aliro range from Siemens.

Aliro is a simple flat system architecture with easy-to-use web based software and  mobile applications.  Offering a flexible  approach to Access Control it enables system management from almost any device with Internet access.

Siemens Aliro

Read more: Mayflex to Distribute Siemens Access Control - Aliro Range

Multi-Factor Authentication: What’s in a Name?

The risks of deploying "good enough" security measures and how organisations can take the necessary steps to ensure they are properly securing remote access systems.

Comparison is a valuable tool in the decision-making process if you are comparing “apples to apples,” as they say. If you were looking for a new mobile phone, for instance, you would look at mobile phones on the market and compare them by screen size, storage capacity and other features important to you. You would not, however, include a rotary phone in your comparison shopping. Even though both make calls and are referred to as a  “phone,” that’s where the similarities end.

david hald lowWEB  GPO RotaryPhone 200fw256fh187

Here we have a view from David Hald

Read more: Multi-Factor Authentication: What’s in a Name?

Boundary Capital invests in X-Ray Security Technology Company

Boundary Capital has announced its investment in Image Scan Holdings plc, a technology company specialising in portable X-Ray devices.

The group’s core technology is based on stereoscopic and multiple view x-ray images. From here the company has developed a range of advanced real-time x-ray screening systems with applications in both the security and industrial inspection markets.

Image Scan supplies a range of portable and rapid deployment solutions to the security sector worldwide including Government, military and private security organisations. Their solutions help to deal with increasingly sophisticated and dispersed threats where rapid reaction is vital.

Read more: Boundary Capital invests in X-Ray Security Technology Company