Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
'Trustworthy' Computing Now Gates' Focus
38 minutes ago
By MATTHEW FORDAHL, AP Technology Writer
SAN JOSE, Calif. - Microsoft Corp. co-founder Bill Gates (news - web sites) is expected to give his perspective Tuesday on computer security and provide an update on the software giant's efforts to make computing more "trustworthy."
He will speak to an estimated 11,000 security experts gathered for the weeklong RSA Conference, sponsored by RSA Security Inc., based in Bedford, Mass.
In the three years since Microsoft launched its initiative to improve the security of its products, the company has changed how its software is written, improved the mechanism for fixing bugs and released some tools for removing virtual pests.
So far, results have been mixed. While there have been no major attacks in recent months, the number of worms and viruses continues to grow and other headaches — such as spam, spyware and adware — are multiplying and quickly becoming security threats themselves.
Most still target Microsoft Windows, the world's dominant operating system.
Since Gates (now the company's chairman and chief software architect) spoke at the RSA Conference in 2004, Microsoft has issued a major security upgrade to Windows XP (news - web sites) aimed at blocking malicious code and protecting users from downloading programs that might carry a virus, worm or other unwanted program.
The company also has recently started releasing programs that remove a limited number of worms and other pests. It's also giving away an early version of Microsoft AntiSpyware, a program that removes unwanted programs and helps protect new ones from being installed.
But so far it's remained mum on when it will jump into the antivirus software business and directly compete against companies that sell programs designed to shore up Windows.
Microsoft declined to comment in advance of the speech.
"It may be something of a natural evolution for them, although ironic given that it's a majority of their software is what they're having to protect," said Vincent Gullotto, vice president of McAfee's Antivirus and Vulnerability Emergency Response Team.
"While they're building software to protect their software, they're also building their software to be secure," he added. "It should prove to be some interesting times."
Meanwhile, Microsoft continues to be a target. Last week, a "Trojan horse" program was detected that attempts to shut down its antispyware program as well as steal online banking passwords.
"This particular attempt appears to be the first by any piece of malware to disable Microsoft AntiSpyware, but it may be the first of many such future attacks," said Gregg Mastoras, senior security analyst at Sophos PLC, a security firm.
Meanwhile, other security software vendors aren't standing still.
Symantec, for instance, has unveiled a new version of its corporate computer security software that promises not only to remove traditional viruses and worms but also adware and spyware. The updated programs are expected to be available next month.
"Customers are looking for spyware and adware protection from their antivirus vendor, a partner they trust," said Brian Foster, Symantec's senior director of product management for client and host security.
McAfee Inc., another antivirus company, also is putting a greater focus on spyware and adware with its McAfee Anti-Spyware Enterprise for corporations. It will be available March 2.
McAfee also is announcing that it will send out updates of its virus definitions on a daily, rather than weekly basis. The new program starts Feb. 24 for its corporate clients. The more frequent updates will be available for its retail software in about three months, Gullotto said.
Aladdin eToken Expands Its Strong Authentication Offering with New One-Time Password Authentication Solution
Aladdin eToken OTP authentication solution enables users to securely access digital corporate resources from anywhere -- in the office, at home, or on the road
Distribution Source : PRNewswire
Date : Tuesday - February 15, 2005
TEL AVIV, Feb. 15 /PRNewswire-FirstCall/ -- Aladdin Knowledge Systems Ltd. , today announced general availability of the new Aladdin eToken NG-OTP hybrid token and the eToken One-Time Password (OTP) user authentication offering. With Aladdin eToken OTP, organizations can now implement cost effective and flexible strong user authentication, having the versatility to enable secure logon to the corporate network without the need for any client software installation or a USB connection.
(Logo: http://www.newscom.com/cgi-bin/prnh/20040416/CGALADDINLOGO )
The new eToken OTP offering is based on the eToken NG-OTP device, Aladdin's innovative smartcard-based hybrid token that enables secure access to organizational networks and applications in both connected mode (with the USB connection) and detached mode (with the one-time password).
By connecting their eToken NG-OTP devices into the computer's USB port, users can take advantage of the full suite of eToken smartcard-based solutions, including secure network access, VPN and web access, password management, PC protection, email security, digital signing of e-business transactions, and more. When a USB connection is not available - for example, in an Internet café or at the airport - users can still securely connect with the eToken. With the push of a button, the eToken NG-OTP displays a randomly generated one-time password that users can use to securely access their network.
The eToken OTP solution includes the eToken RADIUS server for back-end OTP authentication and integration with RADIUS-enabled applications, including leading VPN solutions, web access solutions, and more. The OTP solution is fully supported and managed by the Aladdin Token Management System (TMS), a comprehensive, standards-based management tool for complete enterprise-wide token deployment and life cycle management.
New Level of Flexibility
eToken NG-OTP is highly versatile, enabling a variety of strong authentication methods and security related solutions, all in one device. It is a highly secured device, with both OTP and PKI operations performed on- board the smartcard chip. eToken NG-OTP offers:
* A flexible user authentication infrastructure for all organizational needs
* Zero-footprint strong authentication
* Minimal IT effort and maintenance
* Full integration with eToken smartcard-based authentication and security services
* Robust management capabilities with Aladdin Token Management System (TMS)
"Now IT and security managers can fulfill their multiple authentication needs with one simple device, regardless of where a user is located," said Leedor Agam, vice president of the Aladdin eToken Business Unit. "We're pleased to offer a new level of flexible, yet powerful user authentication through the new Aladdin eToken One-Time Password solution."
For more information on the Aladdin eToken NG-OTP device and one-time password authentication solution, visit the Aladdin Web site at http://www.aladdin.com/eToken.
About Aladdin Knowledge Systems Ltd.
Aladdin is a global provider of software digital rights management (DRM) and enterprise security. Aladdin products include: the HASP(R) family of hardware and software-based products that flexibly protect, license and distribute software and intellectual property; the USB-based eToken(TM) device for strong user authentication and e-commerce security; and the eSafe(R) line of integrated content security solutions that protect networks against malicious, inappropriate and nonproductive Internet-borne content. Visit the Aladdin Web site at http://www.aladdin.com/.
Aladdin Knowledge Systems Ltd.
CONTACT: Media - Matthew Zintel of Zintel Public Relations,
+1-310-574-8888, matthew@zintelpr.com; Investor Relations - Mark Jones of
Global Consulting Group, +1-646-284-9414, mjones@hfgcg.com, both for Aladdin
Knowledge Systems Ltd.
Hitachi to Offer Security-Enhanced Notebook PCs
Tue Feb 15, 4:28 AM ET
TOKYO (Reuters) - Japan's Hitachi Ltd. (6501.T) said on Tuesday it would launch notebook computers with no hard disk drives, offering corporate clients a way to protect key business information from potential leaks.
The new terminal does not store any data, such as client information, in it, and all tasks are carried out by interacting with server computers or PCs at headquarters, protecting vital business information even when the computer is lost or stolen.
Shipments of the new computer, estimated to sell for around 260,000 yen ($2,476) per unit, will start in April, and Hitachi expects 30 billion yen in sales of the terminals and related services in the two years to March 2007.
Hitachi itself plans to introduce 2,000 units by March for in-house use and another 8,000 in the business year starting in April. Shares in Hitachi, Japan's largest electronics conglomerate, closed up 0.45 percent at 668 yen, outperforming the Tokyo stock market's electric machinery index (.IELEC.T), which rose 0.2 percent.
Someday Wave will have a 5 day chart like this
http://finance.yahoo.com/q/bc?s=GTEL.OB&t=5d
And I think we will see it before the end of the year.
Dave
not trying to hype that company, but I happened to buy it on Friday.
Dave
My theory...........
Dell obviosly believes in Wave's product or they would not offer it. What good does it do if every customer service rep doesn't know what it will do inside and out? That means they are on the same page with 97% of the pc users out there right now as I type this. It's very easy for us to lose sight of this. This might cost Dell future business. Those that are in the know and know that Dell is offering this can call and be directed to someone who is up to speed. This is still in it's infancy and I am sure Dell is taking baby steps. This approach probably gives Dell a good gauge on the interest and a chance to see what it does to their pc sales. As this thing moves further out, I think this point will become moot. I think that when the 1.2 is ready to roll out it will be bundled and not an option, basically because of the functionalitty that is opened up by 1.2 and as this thing moves forward the company that is not bundling these will probably lose traction and market share.
Dave
Go kite...........
It was from yesterday
http://www.gcn.com/vol1_no1/daily-updates/35038-1.html
Dave
More Betrusted albeit older
never saw this before
There is a nice accompanying flow chart here
http://www.intelligenceonline.com/NETWORKS/FILES/472/472.asp?rub=networks
Betrusted, a New Security Champion Number two behind Verisign as provider of authentication and information security systems (Public Key Infrastructure: PKI, see P.1), the American firm Betrusted has been on a big shopping spree in Europe and the Asia/Pacific zone since January. Its acquisition of the SecureNet and 90 East firms in Australia ensured it a strong local profile and served as a spring board for deployment in Asia. In Europe, Betrusted has bought most of the technology of Ireland's Baltimore, which enables it to consolidate technical partnerships with the biggest names in the computer industry (among them Microsoft, Oracle, and Ciscol). The acquisition of Germany's TC Trust Center AG added a third ultra-protected operational center (Tempest) to those already existing in Columbia (USA) and near Heathrow airport in London, and which was originally developed by PriceWaterhouseCooper's Global Risk Management division.
© Copyright 1982-2005 Indigo Publications.
Reproduction and dissemination prohibited (photocopy, intranet, web, etc.) without written permission of the editor
I think it has to be, check this out;
In the article the are listed as Betrusted U.S. Inc. of New York. If you go to their web site to the about us section you can bring up the US offices and it states a New York Office but no address. It also shows the offices listed as cybertrust whom they merged with It also shows an office in Ohio and here it is
Cybertrust
4151 Executive Parkway
Suite 390
Westerville, Ohio 43081
USA
Phone: + 1 614 901 3062
a little googling around found this here under Betrusted,US
company name:
Betrusted, US Inc.
contact name: Janis Mitchell
contact title: President
address: 4151 Executive Pkwy Ste 390
city, state zip: Westerville, OH 43081
phone: (614) 901-3062
fax: (614) 889-0867
web site:
I think they might be the one and only. Will keep looking
Dave
Betrusted:Three tapped for PKI
The Office of Management and Budget is requiring agencies to use one of three approved shared-service providers for public-key infrastructure and electronic-signature services.
These three service providers -- the Agriculture Department's National Finance Center; VeriSign Inc. of Mountain View, Calif.; and Betrusted U.S. Inc. of New York -- meet the level-four certification outlined in OMB's December 2003 memo.
In the memo, Karen Evans, OMB's administrator for IT and e-government, and David Safavian, administrator of the Office of Federal Procurement Policy, said agencies must use these shared-service providers to mitigate security risks.
1/10/05
Entrust Integrates With New BlackBerry Enterprise Server(TM) v4.0
DALLAS, Feb. 2 /PRNewswire-FirstCall/ -- Entrust, Inc. , a world-leading provider of Identity and Access Management solutions congratulates Research In Motion (RIM) on the release of BlackBerry Enterprise Server(TM) v4.0 with its easy-to-use security capabilities and newly enhanced integration with Entrust's Secure Messaging Solution. Together, BlackBerry Enterprise Server v4.0 and the Entrust Entelligence(TM) Messaging Server product provide advanced security and enable support for boundary services like anti-virus and content scanning.
"BlackBerry continues to be the leading wireless platform in the government sector and supports a range of security options to meet the requirements of individual departments," said Mark Guibert, Vice President, Corporate Marketing at RIM. "We are pleased to be working closely with Entrust to support the Entrust Entelligence Messaging Server and provide more flexibility for customers using S/MIME."
Entrust Entelligence Messaging Server makes it easier for BlackBerry(R) users to send sensitive information with digital certificates from a BlackBerry(R) handheld, by offloading the details of secure delivery such as certificate retrieval, distribution list expansion, content scanning integration, and delivery methods. This vastly reduces the complexity of sending secure messages, especially to multiple recipients or recipients outside the corporate domain.
BlackBerry integration with Entrust Entelligence Messaging Server also allows for messages to be received via the S/MIME standard or Web mail, in addition to allowing for the support of content scanning, helping organizations to comply with regulations such as HIPAA and SOX. This makes for an easier and more flexible means of communicating valuable information via BlackBerry.
"There is no doubt that BlackBerry is a valuable communications and workflow solution within enterprises and governments, and with the bulk of an organization's documents being shared via e-mail, having strong and easy-to- use security in place is essential," said Leah MacMillan, Vice President, Secure Messaging Solutions at Entrust. "Entrust Entelligence Server integration with BlackBerry helps to demonstrate how easy and convenient secure email can be for both desktop and mobile users."
About Research In Motion (RIM)
Research In Motion is a leading designer, manufacturer and marketer of innovative wireless solutions for the worldwide mobile communications market. Through the development of integrated hardware, software and services that support multiple wireless network standards, RIM provides platforms and solutions for seamless access to time-sensitive information including email, device, SMS messaging, Internet and intranet-based applications. RIM technology also enables a broad array of third party developers and manufacturers to enhance their products and services with wireless connectivity to data. RIM's portfolio of award-winning products, services and embedded technologies are used by thousands of organizations around the world and include the BlackBerry(R) wireless platform, the RIM Wireless Handheld(TM) product line, software development tools, radio-modems and software/hardware licensing agreements. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe and Asia Pacific. RIM is listed on the Nasdaq Stock Market and the Toronto Stock Exchange. For more information, visit http://www.rim.com/ or http://www.blackberry.com/ .
About Entrust
Entrust, Inc. is a world-leading provider of Identity and Access Management solutions. Entrust software helps enable enterprises and governments to extend their business reach to customers, partners and employees. Entrust's solutions for secure identity management, secure messaging and secure data can help increase productivity and improve extended relationships by helping to transform the way transactions are done online. Over 1,400 organizations in more than 50 countries use Entrust's proven software and services to turn business and security challenges into secure business opportunities. For more information, please visit: http://www.entrust.com/ .
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.
The BlackBerry and RIM families of related marks, images and symbols are the exclusive properties and trademarks of Research In Motion Limited.
Entrust, Inc.
CONTACT: David Rockvam of Entrust, Inc., +1-972-713-5824, ordavid.rockvam@entrust.com ; or Doug McGinn of Dittus Communications,+1-202-715-1558, or doug.mcginn@dittus.com , for Entrust, Inc.
Web site: http://www.rim.com/http://www.blackberry.com" target="_blank">http://www.entrust.com/http://www.rim.com/http://www.blackberry.com
When my name changes, I am in the black baby!!
NEC: "utilizing a secure operating system, and realizing newly developed "secure gates" among multiple cores."
NEC Develops Multicore-Based System LSI Platform for Reliable and High- Performance Ubiquitous Terminals
Distribution Source : PRNewswire
Date : Tuesday - February 08, 2005
SAN FRANCISCO, Feb. 8 /PRNewswire-FirstCall/ -- NEC Corporation (FTSE: 6701q.l) and NEC Electronics Corporation today announced the development of a multicore-based system LSI platform toward the upcoming ubiquitous networked society. This technology enables handling of a variety of software, just as PCs with high-performance and low- power capabilities can, and makes it possible to create robust terminals that can offset the breakdown and malfunction resulting from software flaws and other causes. Hardware architecture of this research will be presented at the International Solid-State Circuit Conference (ISSCC) 2005 in San Francisco from February 7 through 9.
The most important requirements of terminals used in a ubiquitous networked environment, such as mobile handsets, in-car terminals, and information-appliance terminals, are considered to be high performance, low power and the ease of expanding functionality, as such terminals will make more advanced applications possible and are expected to be diversified. In addition, security issues arising from computer viruses and other attacks are of utmost concern when creating an environment in which Internet access is possible anywhere and anytime.
Although the parallel processor technology with multiple central processing units (CPUs) is well known as a possibility for high-performance, low-power system LSI platform, it has hardly been applied to ubiquitous terminals due to the difficulty of porting existing software from single-core- based platforms and performance saturation of buses accessed from multiple cores.
NEC's newly developed "Virtual Software Technology" makes the multicore- based system LSI platform applicable to ubiquitous terminals and also makes it easy to expand functionality of the terminals. The development of high- performance bus-circuit technology enables a significant reduction in the congestion of buses linking multiple CPUs. Furthermore, the level of security is improved by assigning a separate CPU to handle applications acquired from the Internet. With the multicore-based system LSI platform containing these technologies, NEC believes that it can create ubiquitous terminals that have the same level of functionality and performance as PCs but which also boast the robustness required to prevent against cyber-terrorism and viruses.
The following main three technologies enabled the development of NEC's and NEC Electronics' multicore-based system LSI platform:
(1) Multicore Virtual Software Technology This software technology enables existing systems to be ported on multiple CPUs without modifying application software. Accordingly, the use of parallel processor technology in ubiquitous terminals is made possible. With the virtual software technology, the parallel processor technology possesses the following three merits: i) Scalability: Since this platform does not assume the number of CPUs under the abstraction software, a variety of terminals can be developed from low to high end based on this platform. ii) Easy addition of values: Once a basic terminal is developed on a CPU, value-added terminals are created by placing designated applications (e.g. business applications) on other CPUs. The single-terminal image is still maintained, making it easy to expand the functionality of value-added terminals. The use of multiple CPUs greatly reduces performance interference from applications added to other applications such as basic terminal features, video and audio even when the added application requires a heavy CPU load. iii) High-performance execution of applications: Even a single application such as speech recognition achieves high-performance and low-power execution when the application consists of sub- applications that are executed concurrently. (Note 1)
(2) Multicore-Based High-Performance Hardware Technology The conventional multicore architecture has a problem of limiting its performance when data access is made from multiple processors. The newly developed "Quad Bus Interface Circuit" significantly decreases congestion of access from multiple processors. This circuit was applied to the MP211 system LSI device (Note 2) for mobile phones and proved that the degradation of performance due to congestion does not occur even with heavily loaded digital TV broadcasting service for mobile phones that deals with tenfold data accesses.
(3) Multicore Security Technology This technology enables the creation of robust terminals that can offset application flaws by isolating downloaded applications on a CPU, utilizing a secure operating system, and realizing newly developed "secure gates" among multiple cores.
It is expected that a number of advanced services on a ubiquitous network can be realized as terminals such as mobile handsets, in-car terminals, and information appliance terminals are increasingly linked to the Internet and other means, and various applications are developed. To that end, it is important to create ubiquitous terminals that have characteristics such as high performance, low power, scalability and reliability. NEC and NEC Electronics believe the completion of multicore-based system LSI platform for creating system LSI chips used in future ubiquitous terminals has been achieved, as the technology realizes high performance, low power consumption, reliability, and the possibility of application to ubiquitous terminals, through multicore virtual software technology and multicore security technology.
Considering the technology paradigm shift based on new concepts, NEC and NEC Electronics believe that their new technology will play a vital role in creating system LSI devices for a future ubiquitous networked society and will continue to proactively engage in research and development of multicore-based system LSI platforms.
About NEC Corporation
NEC Corporation is one of the world's leading providers of Internet, broadband network and enterprise business solutions dedicated to meeting the specialized needs of its diverse and global base of customers. Ranked as one of the world's top patent-producing companies, NEC delivers tailored solutions in the key fields of computer, networking and electron devices, by integrating its technical strengths in IT and Networks, and by providing advanced semiconductor solutions through NEC Electronics Corporation. The NEC Group employs more than 140,000 people worldwide and had net sales of 4,906 billion yen (approx. $47 billion) in the fiscal year ended March 2004. For additional information, please visit the NEC home page at: http://www.nec.com/.
About NEC Electronics Corporation
NEC Electronics Corporation specializes in semiconductor products encompassing advanced technology solutions for the high-end computing and broadband networking markets, system solutions for the mobile handsets, PC peripherals, automotive and digital consumer markets, and platform solutions for a wide range of customer applications. NEC Electronics Corporation has 26 subsidiaries worldwide including NEC Electronics America, Inc. and NEC Electronics (Europe) GmbH. Additional information about NEC Electronics worldwide can be found at http://www.necel.com/.
Note 1: Announced on January 26, 2005; Note 2: Announced on September 27, 2004
NEC Corporation
CONTACT: In Japan: Diane Foley of NEC Corporation, + 81-3-3798-6511 or
d-foley@ax.jp.nec.com; In Japan: Sophie Yamamoto of NEC Electronics
Corporation, + 81-44-435-1676 or sophie.yamamoto@necel.com; In the Americas:
Kazuko Andersen of NEC USA, Inc., +1-212-326-2502 or
kazuko.andersen@necusa.com; or In the Americas: Denise Viereck Garibaldi of
NEC Electronics America, Inc., +1-408-588-6620 or
denise_garibaldi@necelam.com
Web site: http://www.necel.com/
Defense makes digital validation apps available globally
By Dawn S. Onley
GCN Staff
The Defense Department has rolled out two applications to validate the authenticity of digital signatures for its Common Access Card program.
DOD’s Public-Key Infrastructure Program Management Office has chosen Tumbleweed Valicert Validation Authority from Tumbleweed Communications Corp. of Redwood City, Calif., and Real Time Credential Validation Authority from CoreStreet Ltd. of Cambridge, Mass.
Defense will make both apps available globally to millions of Defense users who use their CACs to send e-mail, digitally sign documents and access secure systems.
DOD searched for products to speed up the validation process, which currently requires users to download more than 30M of data and takes longer than an hour. The PKI office reviewed products from nine vendors before settling on the Tumbleweed and CoreStreet apps.
Each app cuts the validation time to 65 milliseconds and requires the download of a file no larger than a few hundred bytes, according to DOD officials.
It’s a good thing the apps will be available. The slow downloads “cost us tremendously in productivity and drove people to circumvent the security built into our systems,” said Gil Nolte, director of the PKI office.
The new process is “so quick that it is transparent to the user, and we’re now able to ensure the security and validity of digitally signed communications,” he said.
Tumbleweed Touts 'Dark Traffic' Stopper
Tumbleweed Communications follows in the footsteps of security rivals such as Symantec by launching an appliance that sits at the network edge and eliminates up to 50% of unwanted mail traffic before it hits enterprise mail servers.
By TechWeb News
Feb. 8, 2005
URL: http://www.informationweek.com/story/showArticle.jhtml?articleID=59301993
Tumbleweed Communications on Tuesday followed in the footsteps of security rivals such as Symantec to launch an appliance that sits at the network edge and reduces up to 50 percent of the unwanted mail traffic before it hits enterprise mail servers.
MailGate Edge monitors such characteristics as MailGate Edge the sender IP address, the number of connections, message volume, intended recipients, and other attributes across SMTP connections to identify bad behavior patterns. The appliance, said Tumbleweed, can reduce unwanted e-mail by 20 to 50 percent.
Directory Harvest Attacks (DHAs), for instance, often come from a relatively small number of IP addresses, and send a high number of messages with invalid recipients. (DHAs are brute force attempts by spammers to collect valid e-mail addresses from an organization or company, and involve sending thousands of messages with suspected addresses.) Such patterns can be spotted, and the traffic stopped.
MailGate Edge can block much of the Internet's "dark traffic," the term some give to the aggregate of spam, DHAs, mail denial-of-service attacks, and invalid SMTP packets. Tumbleweed claims that some 70 percent of all e-mail traffic is "dark."
Tumbleweeds 1U appliance analyzes SMTP traffic , a different approach than Symantec's recently-announced Mail Security 8160 appliance, which filters at the TCP/IP level, stopping spam on the spammer's servers rather than letting it reach the enterprise network.
Another that can't be understated here is that Wave is able to bring these solutions to the market in a three pronged way. They can market the solutions themselves. The can have the Big Boys bring the product to the market. Lastly the can cover the market through the lesser knowns (white boxes) who get their compnents from the major players. It's a pretty good bet that there is at least one of these bring in some cash today, but there will be a time in the near future when all three will be generating revenues at the same time.
Dave
I believe true-if they are going to take the deferred revenue from last quarter.
Dave
I'll take a stab at that..............
To me it is becoming more evident that Wave is becoming a larger part of the security landscape as the months go by and more of the puzzle is unearthed. The same thread that seems to running through in the majority of these announcements is Wave is not mentioned front and center. If you dig a little you can see it, ala the Tumbleweed PDF Intel stuff and NSM as well. Others can be greatly infered with some sort of certainty thanks to the relentless pursuit of the truth by many of those here. And then we get a Dell putting us out front and center, and then you still have to know where to look-but it's still early.
A wise man once said that one gorilla could not be the keeper of security, the setter of the standard (IBM, INTEL, MSFT). It just would not look kosher. What we are seeing is these companies all beginning to offer some sort of security solution. ETS software, Motherboards, TPM's, readers and so forth. When the TPM's are referenced in articles, it is the new HP has a TPM, not TPM's by_________. Or Intel motherboards inside secured by__________. It almost makes it seem that each company has come up with security on their own, their own solution as it seems to be presented to the general public.
Step back for a moment and take this in. Tpm's are becoming the catch phrase for security in pc's. Wave does that. You need a trust suite. Wave does that. Motherboards, Wave can help there too. Secure card readers, Wave can help. Trusted Stack-Wave. Need help securing on line documents, Wave can help. Need your e-mail secured, Wave can help you too. How about a platform to deliver content to your PC. We can help their too. Secure keyboards-Yep.
I think this is the tact that is being taken today, keep a low profile, get a crumb thrown our way once in awhile and then when the infrastructure is in place and 1.2 is going out Wave will already be an established player in many different facets of a secure computing environment. I think there is a perception by this bigger companies of being beaten to the punch by a small group of visionaries and an even harder thing to swallow knowing there is no endgame around the solution. This slow stealthy approach is the way to ease the explosion onto the marketplace without a clearcut winner. Notice how the white boxes have been offering the Intel motherboard, Intel too without much fanfare, Dell brings out the TPM's in a big way and followed by HP in less than a week. The others will follow like falling dominoes. By the end of the year itn won't matter who did what first becasue they will all be offering some sort of security in one form or another and Wave will probably be in the majority of those solutions. Right after the Intel/IBM sec hiccup, I made a post that those who were in at that time would be very happy at some point within the next 18 months. That puts us around July/August. I still stand by that.
Dave
Came on board last week...........
A friend of mine had been watching the company and steered me towards them. Did some DD and liked what I saw. Glad to get in when I did
HP's AMD SLI workstation specs emerge
Quite the machine, this one
By Harta Glass: Wednesday 19 January 2005, 11:08
SOURCES CLAIMED HP will release the Opteron based xw9300 workstation which incorporates Nvidia SLI technology in mid-February.
The processor options are for a 252 or 248 Opteron, using 1GHz/800MHz hypertransport technology, in a mini tower configuration.
The machine will support five HDD, come equipped with a 750W power supply unit, have two PCIe 16X slots, one PCI 1X, one PCI-X 133, and two PCI-X 100 slots.
The drives can be S-ATA or SCSII, while the chipset is the Nvidia Nforce Professional coupled with the AMD 8131.
The machine will support DDR-1 400 ECC, with capacity of up to 16GB and using eight DIMM slots. It supports Firewire, USB, and will be offered with a number of different removable storage options.
Graphics options include Nvidia Quadro NVS280 (PCI Express), Nvidia Quadro FX540, Nvidia Quadro FX1400, and Nvidia Quadro FX3400. The machine will also have a TPM (trusted computing) connector, we understand.
OSes supported include XP Professional, XP Professional 64-bit, and Red Hat WS3 which is also 64-bit. µ
http://www.theinquirer.net/?article=20797
Unpuff your chest jack... My response came before Snackman's and I thought I was just trying to correct something that very easily was misconstrued by Larry during his post. As far as checking the facts, I posted the PR verbatim as it was released, so maybe YOU are the one that needs to do a little fact checking.
Wave Systems Receives U.S. Military Academy Contract for a Data Security Project
Lee, MA – December 16, 2004 – Wave Systems Corp. (NASDAQ:WAVX) today announced it has received an order from the United States Military Academy's Information Technology Operations Center for Wave to provide information technology products associated with the academy's Secure Content Dissemination and Data Retrieval Computer System project.
Wave will provide technology, including its EMBASSY® Trust Suite software, EMBASSY-enabled smart card readers and TecSec® Inc.'s CKM®-enabled Role Based Access Controls software.
“We are very excited about this project and we believe it will give our cadets a first hand appreciation for the challenge of getting information securely into, out of, and across the Department of Defense's Global Information Grid,” said Dr. Aaron Ferguson, Department of Defense Visiting Professor, Department of Electrical Engineering and Computer Science, United States Military Academy.
“The software and hardware provided by Wave supports the Department of Defense funded cadet Capstone project for secure information sharing,” he said. “This software and hardware should allow the cadet team to develop a secure, smart card-enabled network enterprise prototype on a ‘trusted' platform.”
The USMA was recently re-designated by the National Security Agency as a Center of Academic Excellence in Information Assurance Education.
“The project prototype involves strongly authenticating authorized users of MSOffice® documents and data applications, allowing those users to process the documents using digital signatures and allowing users to access specific documents or portions of documents based on cryptographically-based role-based access controls,” said Dr. Ferguson. “Cadets will be using the technology from Wave and TecSec to demonstrate interoperability with the U.S. government's Common Access Card. There is potential for broad application of these technologies in the existing military data security environment.”
“Wave has invested heavily in Trusted Computing and Identity Management hardware and software solutions,” said Brian Berger, Wave's executive vice president, marketing and sales. “We believe these technologies could play an important role in making government personal computers more trusted and secure while making the PC applications more secure and easy to manage. We look forward to participation in the project at West Point.”
“The use of the Wave technology combined with TecSec's CKM products provide the project with powerful tools to accomplish their objectives,” said John Petty, TecSec's Chairman and CEO.
CKM, short for Constructive Key Management, provides enforced access control and data management allowing users to control anything that can be named, from a character, page, image or sound in a document or form to a field in a database.
The approach of differentially encrypting data based on the need-to-know or need-to-share principle allows secure communication among groups of individuals with a variety of roles. Those individuals who have a legitimate need to view information have access to it, while others don't. More information on TecSec's CKM products and technology is available at www.tecsec.com.
More information about Wave's trusted products and solutions is available at www.wave.com.
About Wave Systems Corp.
Consumers and businesses are demanding a computing environment that is more trusted, private, safe and secure. Wave is the leader in delivering trusted computing applications and services with advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers. For more information about Wave, visit http://www.wave.com.
Safe Harbor for Forward Looking Statements
Except for the statements of historical fact, the information presented herein constitutes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such forward-looking statements involve known and unknown risks, uncertainties and other factors which may cause the actual results, performance or achievements of the company to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. Such factors include general economic and business conditions, the ability to fund operations, the ability to forge partnerships required for deployment, changes in consumer and corporate buying habits, chip development and production, the rapid pace of change in the technology industry and other factors over which Wave Systems Corp. has little or no control. Wave Systems assumes no obligation to publicly update or revise any forward-looking statements.
All brands are the property of their respective owners
For more information please contact:
NEC Solutions America Unveils Health Care Market Vision for North America
RANCHO CORDOVA, Calif.--(BUSINESS WIRE)--Jan. 31, 2005--
Tech and Health Care Industry Veteran to Lead Effort; Customers Deliver Feedback on NEC TouchPass(R) -- Secure Single Sign-on Solution
NEC Solutions (America) Inc., a premier provider of integrated solutions for the Connected Enterprise in North America, today announced its vision for providing products, services and solutions to the North American health care market, introducing the leadership behind the new effort, and detailing its early customers' success in deploying NEC technology in health care environments.
The NEC Solutions America (NECSAM) Health Care Solutions Division (HCSD) will focus its initial efforts on providing hospital systems and health care payers with tools, solutions and services to improve security, safety and communication. The ultimate goal of those enhancements is to measurably improve patient safety, quality of care and reduce administrative costs.
The Health Care Solutions division will be spearheaded by Lauryn Jones, who brings almost three decades of technology experience and 15 years of health care experience and entrepreneurialism to the post.
"NEC Solutions America is committed to a market-driven approach for the health care market in North America, and to that end, we look forward to providing services and solutions that facilitate regulatory compliance, leverage our customers' existing investments and systems, and ultimately deliver real value," said Jones, general manager, Health Care Solutions Division, NEC Solutions America. "To the extent that NEC Solutions America delivers on those commitments, we will fulfill ours and our customers' vision of improving patient quality of care, safety and, ultimately, the health care services industry overall."
With ever increasing administrative costs and decreasing clinical resources, the need is high to improve the quality and efficiency of the infrastructure, reduce administrative costs and improve communication, while enhancing patient safety and quality of care. To meet these pressing IT concerns in the health care industry, NECSAM is introducing its TouchPass(R) -- Secure Single Sign-On system to the health care market.
TouchPass -- Secure Single Sign-On uses biometric finger-imaging to identify individual users accurately to authorize access to computers, networks and applications using only a fingerprint. Because it leverages existing IT investments, TouchPass is an affordable solution that is easy to install, use and deploy. Its immediate positive impact on current practices has been validated by early customers' successes in various health care environments.
TouchPass is the first in a series of NECSAM solutions designed specifically for the health care market. In coming weeks, NECSAM expects to announce wireless voice communication and automated patient identification and admission solutions, each with significant enhancements that were developed following the company's ongoing dialogue with health care providers and payers.
"NECSAM is embarking upon this mission both with the entrepreneurial freedom and spirit of a start-up company, and the long legacy of technology and health care IT expertise that NEC Corp. has earned," said Jones. "At the same time, NECSAM has invested significant time engaging directly with the North American health care community in order to best understand and serve this market specifically, and we are confident our approach is rooted in delivering real-world solutions to real-world problems."
As the general manager of the Health Care Solutions Division, Lauryn Jones brings 27 years of IT and 15 years of health care experience to NEC Solutions America. Most recently, she co-founded and managed Medical Data International and Personal Genetics. She also served as a senior executive at United Health Group, the nation's largest health care payer, HNC and Health Systems Design. Ms. Jones was also a member of the original Macintosh Development Team responsible for Apple Peripherals, and founded a Macintosh Peripherals Company.
Availability
NEC's TouchPass -- Secure Single Sign-On for health care is available now. To sign up for a web demonstration or to speak to an NEC representative directly contact us at (877) 632-0064 or email us at healthcare@necsam.com.
More information about NECSAM health care solutions is available at http://www.necsam.com/HealthCare.
About NEC Solutions (America), Inc.
NEC Solutions (America), Inc. is a premier provider of integrated solutions for the Connected Enterprise in North America. As an affiliate of NEC Corporation (Nasdaq:NIPNY) (FTSE:6701q.1), NEC Solutions America taps into a global resource network to help clients leverage technology to achieve a competitive edge. From corporate performance management and biometric security solutions to digital cinema and in-theatre advertising systems, visual displays and server solutions, the expertise is delivered with the personal attention needed to address individual situations. With headquarters in Rancho Cordova, California, NEC Solutions America serves a wide range of markets, including the health care and public safety, financial services, cinema, retail and manufacturing markets. Information regarding NEC Solutions America can be found at www.necsam.com.
NEC is a registered trademark of NEC Corporation. TouchPass is a registered trademark of NEC Solutions (America), Inc. All Rights Reserved. (C) 2005 NEC Solutions (America), Inc. All Rights Reserved. Other product or service names mentioned herein are the trademarks of their respective owners.
Cubic does smart cards...........
Cubic Acquires Parking Assets of Lexis Systems and Forms New Company; Cubic Parking Systems Will Expand Regional Smart Card-Based Payment Systems Beyond Public Transit
SAN DIEGO --(Business Wire)-- Jan. 18, 2005 -- San Diego-based Cubic Corporation (AMEX:CUB) today announced that it has acquired the assets of Lexis Systems, a Vancouver-based provider of revenue collection systems for parking and public transportation. The acquisition includes intellectual property, technology, the complete product line and software suite, inventory and the Vancouver-based operations.
The assets from Lexis Systems, together with the recently acquired Traf-Park, comprise a new business unit for Cubic Transportation Systems, called Cubic Parking Systems. The company is a wholly-owned subsidiary of Cubic Corporation.
The latest acquisition and company formation enhance Cubic's regional smart card systems for public transit in parking, a vital service in major metropolitan areas.
The North American parking equipment and system control market is more than $200 million per year and is poised for growth as municipalities move away from single-space, coin-operated on-street meters to 'multi-bay' meters that take contactless smart cards as a form of payment.
With the combined installed customer base of Lexis and Traf-Park, Cubic Parking Systems has a substantial share of the parking market, with more than 2200 pieces of equipment installed for almost 200 customers in the United States, Canada and Mexico.
Cubic Parking Systems is headquartered in Vancouver and has regional offices in Montreal, Toronto, Nashville and San Diego.
Cubic Parking Systems is the only company to offer a contactless smart card payment system for on-street and off-street parking that is integrated and interoperable with public transit fare collection systems, so that commuters can pay for parking their vehicles with the same smart card they use to pay for fares on public transportation.
Previously, Lexis Systems has been a provider of a variety of managed services for major parking operators, national park systems, universities and colleges, hospitals, city and county projects, major ski resorts, boat marinas and large city transit programs.
Earlier this year, when the Washington Metropolitan Transit Authority (WMATA) decided to use its SmarTrip(R) smart card system for all of its parking, it chose Lexis to provide the equipment.
Nearly 1200 Lexis Pay Stations are installed throughout North America in key cities, including Vancouver, Seattle, San Francisco, Los Angeles, Santa Monica, San Diego, Denver, Dallas, Houston, Chicago, St. Louis, Minneapolis, Cleveland, Cincinnati, Columbus, Pittsburgh, Baltimore, Washington, D.C., and Atlanta. Cubic has smart card automatic fare collection systems in many of these cities and good opportunities in others. Parking is a factor in all of them. Integration with the mass transit ticketing system is a natural step.
Central Parking Corporation (NYSE:CPC), a $1.3 billion NYSE company, previously owned, through an affiliate, a controlling interest in Lexis Systems and operates Lexis machines in over 500 locations. Cubic Parking Systems will continue to support Central Parking as a supplier and systems integrator under a 5-year service contract. "As the world's largest operator of parking services, we are very excited about the opportunities this opens up for us to provide services that are interoperable with regional smart card programs," said Emmanuel Emanuel Eads, President and Chief Operating Officer of Central Parking Corporation.
Cubic Transportation Systems, Inc., is the world's leading full-service solution provider of automated fare collection systems for public transport, including bus, bus rapid transit, light rail, commuter rail, heavy rail, ferry and parking. Cubic's solutions and services include system design, central computer systems, equipment design and manufacturing, device-level software, integration, test, installation, warranty, maintenance, computer hosting services, call centre services, card management and distribution services, financial clearing and settlement, multi-application support and outsourcing services.
Every year, nearly 10 billion rides are taken worldwide using Cubic fare collection systems. Cubic has delivered over 400 projects in 40 major markets on five continents. Active projects include London; New York/New Jersey region; Washington, D.C./Baltimore/Virginia region; Los Angeles region; San Diego region; San Francisco; Minneapolis/St. Paul; Chicago; Houston; Atlanta; South Florida; Vancouver and Edmonton, Canada; Brisbane, Australia; Singapore; Bangkok, Thailand; and Scandinavia.
The corporation's other major segment, the Cubic Defense Applications group, is a world leader in realistic combat training systems, mission support services and defense electronics. For more information about Cubic, see the company's Web site at www.cubic.com.
Tec Sec is having a security conference on IP ready technology
Feb 27th through March 1st
https://secure.unitedpublications.com/techsecsol/TechSecProspectus.pdf
who will be there as of right now
BroadWare Technologies
Cisco Systems
DVTel
EMC
Fidelity Investments
Intellivid Corporation
NetBotz
NetVersant
Northrop Grumman
Object Video
PSA Security Network
Security By Design
Security Net
Vidient
FWIW.. The responses to Greg's posts speak more to those doing the replying than to what Greg is posting. Greg is free to post whatever he wants as long as it comes within the guidelines of the IHub community. You don't have to agree with him, man people are forgetting that's what makes this country great. You can ignore him, hell you can make him disappear by putting him on ignore. He hasn't changed his tone since he has come on the scene, yet the same discourse plays out again and again. I think these are the shaky hands squabbling, looking for some sort of verification that they are making the right choice by staying here, ignoring and bashing disenting opinion, no matter how trite and repetative. For anybody to have been here for as long as most your resolve should not waver in the acceptance of the tech. It either is going to happen or not. If that makes you queasy in your guts, you should have crammed your money in I-bonds. This is a true all or nothing stock. There is a very real possibillity this thing could come up bust, and if that's the case I hope I'm not underneath a bridge or tall building in your town if this thing goes belly up.
Looky here..Microsoft, Verizon, in TV Deal
Fri Jan 28, 7:21 PM ET Technology - Reuters
SEATTLE (Reuters) - Verizon Communications Inc. will use Microsoft Corp.'s software technology to deliver video services over high-speed data lines, the companies said on Friday.
Microsoft, the world's largest software maker, also has similar deals with SBC Communications Inc. and Comcast Corp. and is trying to spread the adoption of its software beyond Windows into devices for the living room.
Verizon, the largest U.S. telecommunications company, said that it would use Microsoft's software to offer high-definition television, digital video recording and on-demand programming to its customers.
Verizon will offer the technology on its new fiber-optic network service, called "FiOS," which is due to launch later this year promising faster Internet and networks speeds along with richer content.
The deal marks another win for Microsoft, which has been trying to get its software widely deployed in the television and cable industries for years with little success, despite billions invested in cable companies during the 1990s.
Terms of the deal were not disclosed.
In November, Microsoft announced a 10-year, $400 million deal with SBC, the second-largest U.S. telecommunications company, to deliver video services over data lines.
Earlier in November, Comcast agreed, the largest U.S. cable operator, said it would deploy video recorder set-top boxes built with Microsoft software to about 1 million Comcast subscribers in Washington state.
Microsoft has been trying for years to move its software beyond the office and into living rooms and people's pockets.
Moshe Lichtman, corporate vice president of Microsoft's TV division, said in a statement that the deal demonstrated that service providers are "choosing Microsoft TV as the software platform for their digital TV and digital home services."
Microsoft's software will run on set-top boxes made by Motorola Inc. for Verizon, the companies said in a statement
Comodo CA – Fastest growing certificate authority in 2004
New York 19th January 2005. Comodo, the security infrastructure specialists were delighted to be awarded the title of the world’s fastest growing CA in 2004 - a feat they also achieved in 2003.
The independent research carried out by Esoft inc analyzed servers worldwide and indicates that Comodo’s share of secured servers grew at a faster rate than any of its competitors and now accounts for over 8% of the total market. Steve Roylance, Technical Marketing VP Comodo Inc, commented that repeating the previous year’s successes demanded proactive measures in the increasing competitive CA marketplace:
“Rock bands often complain about the ‘difficult second album’. Although the comparison may seem glib, the theory holds true for any business hoping to build upon an initial success. Maintaining the momentum we generated in 2003 involved a company wide commitment that Comodo was not going to rest on its laurels.”
During the 2004-2005 period, Comodo successfully expanded and improved its business model - extending their portfolio of solutions whilst taking steps intended to ensure they become the pre-eminent force in the CA industry. Notable moves included the acquisition of high profile CA UserTrust and the provisioning of a fully integrated CA infrastructure for the new .pro TLD registrar Registry Pro. The continued development of complementary products such as VerificationEngine and TrustToolbar formed key strands in Comodo’s strategy to improve the transparency and security of online transactions. Anti-Phishing technologies such as Content Verification Certicates™ were developed to provide real time verification of website content such as brand logos and graphics.
“Comodo CA is here for the long haul. We have always offered the industry benchmark in terms of security, speed of issuance and price. The developments of the last 12 months will help consolidate our future as one of the major certification authorities forming the backbone of the SSL industry and the greater PKI landscape. Through continued innovation, investment and expansion we will fulfill our pledge to offer the highest level of business stability and assurance to enterprise clients.”
About Comodo
Comodo are the world’s fastest growing WebTrust Compliant Certification Authority and the industry leader of high quality digital certificates. With more than 3,000 global partners and 200,000+ websites using our SSL certificates and website identity assurance products, Comodo offer unrivalled TCO and provide you with the tools you require to manage your own and your customer’s digital certificates.
www.comodo.com
COMODO ACQUIRES PSOFT
Jersey City, NJ - January 24, 2005 - Comodo Inc., the leader in secure Internet technologies, has acquired Positive Software Corporation of Brooklyn, New York. Positive Software (PSOFT) is the developer of H-Sphere, a scalable multi-server web hosting control panel that provides complete hosting automation for Linux, BSD and Windows2000/2003 platforms, offering an extensive, easy-to-use interface, a billing system, a "brandable" reseller product, and an integrated trouble ticket system.
PSOFT also develops CP+, a web based control panel for dedicated servers that supports most Linux & FreeBSD operating systems. CP+ offers a graphical interface for Admin, Domain Owner and End User levels, and complete functionality to manage the server and its components.
The merger represents the "perfect blending of corporate and technical philosophies," according to Comodo President and CEO Melih Abdulhayoglu. "PSOFT adds seamlessly integrated hosting components to a growing and comprehensive online product offering." He adds, " Both companies have been actively engaged in the development of secure and robust business solutions, and the cost-effective offering of those solutions in the marketplace.
"The addition of PSOFT helps make Comodo unique among the competition in terms of scope, quality, and price points," says Abdulhayoglu. "We now offer a complete and totally integrated line of Internet business solutions, and furthermore we have the ability to fully accommodate our partner-resellers in the web hosting industry with the kind of support they have come to expect from Comodo."
PSOFT's Igor Seletskiy will be retained in the capacity of Technical Director and will oversee the continuing development of H-Sphere and CP+.
Comodo, headquartered in Jersey City, NJ, provides cost-effective, comprehensive, secure and functional online business solutions. Other Comodo products include the TrustFAX online document manager, AssureBuy payment gateway, MegaCRM customer and sales management, iBranded website development and marketing interface and domain search, InstantSSL (CAs), and Trustix operating system and secure server and firewall appliances.
About Comodo
Comodo is an industry-leading provider of information security, management and communication technologies. They create innovative and practical solutions for the SMB, enterprise, home, e-commerce, education, healthcare and governmental markets. Through its Infrastructure Solutions product line, the company endows its customers with a competitive advantage by providing a superior suite of enterprise security, networking and productivity solutions covering perimeter security, VPN, Mail and LAN. Other core technologies include intrusion detection, SSL certificates, content filtering, end-point security and access management. They offer a comprehensive portfolio of solutions that comprise the industry's best combination of security, performance, intuitive interface and value.
Comodo is the world's fastest growing provider of critical infrastructure solutions and can be reached at (US) +1 888-COMODO1
Phoenix and Wave mentioned by SKS
1st quarter 03 conference call:
"We've had a long history of trying to put hardware into a variety of devices, and to get the concepts of flexible, programmable solutions of hardware security into those devices. And we feel that now we're perfectly situated to take advantage of the hardware platform that's being deployed in both TCPA 1.1 and what will become TCG 1.2, as a platform that can support many if not all the of concepts and services that Wave's been pursuing for a long time. So our company, if you look at the array of players who announced the formation of TCG, what you saw were PC vendors and processor vendors and the operating system and as I mentioned before cellular and consumer electronics. And really there are only a couple of companies that are supporting services. Clearly one is Verisign and they bring certificate infrastructure, and Phoenix who brings the BIOS support to TCG, and Wave is bringing the utility services to help make a trusted computer something that is easy to manage and deploy and that has some very basic services that when you open up your box it does something cool. And we're really focused on the first customer impression of a trusted computer, whether that's an enterprise customer or a professional user, and out at some point in the future hopefully a consumer user as well. So we see a tremendous market opportunity for us. This is an effort that has very strong support from the major players. Microsoft at WinHEC devoted a very substantial amount of the WinHEC conference to discussing their plans for trusted computing. Intel has participated in a number of presentations. HP has promoted the solution. So there's good industry support behind this. And in our relationships with the chip vendors we're beginning to also see the adoption of the platform through a number of the OEMs, and I'll talk about that a little bit further. So the relaunching of Trusted Computing is a very important event for us. The fact that we're an early stage player as part of it, I think shows our role amongst the players who are there. They consider us as somebody who is very helpful in getting this put out there."
http://www.unclever.com/wavx/WAVX1Q03.html
Dave
Both at the Intel Developers Conference March 1st through the 3rd
http://www.intel.com/idf/us/spring2005/systems/se_list.htm
Dave
DEll white paper 12/04
Securing Network-Based Client Computing:
User and Machine security
http://www.dell.com/downloads/global/vectors/2004_tpm.pdf
Tumbleweed Announces Record Revenue in 2004
Monday January 24, 4:00 pm ET
CEO Announces Succession Plan
REDWOOD CITY, Calif., Jan. 24 /PRNewswire-FirstCall/ -- Tumbleweed® Communications Corp. (Nasdaq: TMWD - News), a leading provider of e-mail and file transfer security products for enterprises and government agencies, today reported results for the fourth quarter and year ended December 31, 2004.
Financial Results
Tumbleweed reported Q4-04 revenue of $12.1 million, up 20% from $10.0 million in Q4-03; a net loss of $923,000, compared to a net loss of $703,000 in Q4-03; and non-GAAP income, which excludes certain items described below, of $102,000, compared to $334,000 in Q4-03. Net loss per share was $(0.02). Non-GAAP loss per share was $0.00.
For the year 2004, Tumbleweed reported record annual revenue of $43.4 million, up 42% from $30.6 million in 2003; a net loss of $7.5 million, compared to a net loss of $9.2 million in 2003; and non-GAAP loss of $2.5 million, compared to non-GAAP loss of $4.7 million for 2003. Net loss per share for 2004 was $(0.16). Non-GAAP loss per share was $(0.05).
Cash balances were $21.4 million at December 31, 2004.
"2004 was a record year for Tumbleweed across a variety of metrics, including revenue, income, cash-flow, product delivery, distribution, and new customer acquisition," said Jeffrey C. Smith, Chief Executive Officer of Tumbleweed. "For the year, we added three hundred and fifty new customers, grew our revenue by more than 40%, and generated cash from operations."
"Fourth quarter results exceeded our estimates. The investments we made in products and distribution in the front half of 2004 are beginning to have a positive impact and provide Tumbleweed with increasing momentum entering 2005," said Mr. Smith
"In addition to our continued revenue growth, we increased our cash position by more than $800,000 in the quarter and were cash flow positive from operations in the quarter and for the year," said Tim Conley, Chief Financial Officer of Tumbleweed. "We are pleased to have finished the year with a very solid quarter."
New Customer Wins
Tumbleweed continued to execute on its goal of attracting new customers while expanding penetration into its existing customer base. During the fourth quarter, Tumbleweed signed approximately 400 customer contracts including 100 new customers. Approximately 100 customers entered into contracts for repeat business, exclusive of maintenance renewals. Tumbleweed has more than 1,000 enterprise customers.
New customers were primarily in the financial services, health care, and government markets and included such accounts as Barclays Global Investors, Children's Hospital Seattle, Collegiate Funding Services, Driscoll Childrens Hospital, Henry Ford Health System, Intermountain Healthcare, Irish Life and Permanent, RL Polk & Co., and a division of the U.S. Army.
Demonstrating continued customer satisfaction with its products, Tumbleweed received orders for expansion of existing applications or new product deployments from its existing customer base. These orders were from accounts such as Aetna Life Insurance, American Express, Bank of America, Express Scripts, Hewitt Associates, McKesson HBOC, National City Corp., Premera Blue Cross, TD Waterhouse, the U.S. Navy, Wachovia Bank and Wells Fargo Bank.
Product News and Industry Recognition
Tumbleweed continues its leadership in the communications security market, with new products shipping in volume in its secure email and file transfer product lines. Through its growing product portfolio, Tumbleweed has pioneered the "two-tier" approach to secure communications, offering multiple solutions within each product line that can be used together or separately to protect information at various points within the network. META Group, an industry analyst firm, recognized Tumbleweed's leadership by giving the Tumbleweed Email Firewall product its highest product functionality rating in a report comparing Tumbleweed and its key competitors.
* Tumbleweed Email Firewall was ranked by META Group as having the best
email hygiene functionality in the industry in the firm's "E-Mail
Hygiene Vendor Comparison" META Practice Report. The study focused on
the top twelve companies providing hygiene solutions, comparing them
across twelve key criteria. Tumbleweed received the highest marks in
the overall Product Functionality category and the top scores in
content filtering and secure mail categories.
* Tumbleweed announced the release of Email Firewall 6.1, which includes
the integration of Intent-Based Filtering (IBF) artificial
intelligence into the product, as well as enhancements to system
management, the policy engine and security. Email Firewall 6.1 is
especially significant in that it is the first version of the product
to leverage technology (IBF) gained from the Corvigo acquisition and
accompanying MailGate product line. Now, both Email Firewall and
MailGate share the same best-of-breed technology, employing both IBF
and Dynamic Anti-Spam for pro-active and reactive spam prevention.
* During the quarter, Tumbleweed began production shipments of MailGate
Edge, Tumbleweed's newest addition to its suite of email security
products. MailGate Edge provides network-level perimeter defense,
blocking Directory Harvest Attacks (DHAs) and Denial of Service (DoS)
attacks before the unwanted traffic enters the corporate network.
MailGate Edge complements Tumbleweed's other email security offerings,
offering an additional "tier" of protection and stopping intrusions
before they can adversely impact network and server performance.
* During Q4, Tumbleweed successfully shipped the appliance version of
SecureTransport, the Company's industry-leading enhanced file transfer
solution, resulting in orders of more then $1.0 million for this new
product. By providing an out-of-the-box, hardened Linux appliance,
SecureTransport makes it even easier for organizations to move from
VPNs, proprietary networks and home-grown FTP and EDI point products
to a standard, easy-to-deploy and cost-effective solution for securely
transferring files.
Expanding Distribution
Tumbleweed continued its efforts to expand its distribution and market reach by adding 14 new channel partners in the quarter. In addition to selling the MailGate and MailGate Edge appliances through the channel, Tumbleweed also began working with select resellers to expand their product depth, successfully closing its first SecureTransport, Secure Messenger, and Email Firewall deals through resellers.
Patents
The U.S. Patent and Trademark Office granted one additional patent to Tumbleweed during the quarter, Patent No. 6,826,609 "Policy enforcement in a secure data file delivery system." Tumbleweed now owns 21 U.S. patents.
Tumbleweed also secured license agreements for its Email Firewall patents with two additional competitors during the quarter. Tumbleweed has now licensed its patents to twelve competitors, reflecting the continued value and relevance of its intellectual property for the email security industry.
First Quarter Financial Outlook
Tumbleweed's outlook for the first quarter of 2005:
* Tumbleweed currently estimates that revenue in the first quarter of
2005 will be between $11.0 million and $12.0 million. This estimate
reflects in part the historically seasonal nature of its business in
which, over the past several years, revenue has been flat or lower in
the first fiscal quarter as compared to the fourth quarter.
* GAAP net loss for the first quarter of 2005 is currently expected to
be approximately $2.0 million to $1.0 million, or $(0.04) to
$(0.02) per share.
* The non-GAAP results for the first quarter of 2005 are currently
expected to range from a loss of $1.0 million to breakeven, or
$(0.02) to $0.00 per share. Per share amounts are based on
approximately 48.0 million shares. Non-GAAP loss excludes
amortization of intangibles and stock-based compensation expense
estimated to be approximately $1.0 million.
* Cash balances are expected to be at least $20 million at the end of
the first quarter.
Transition of Chief Executive Officer
Tumbleweed also announced today that Jeffrey C. Smith, who currently serves as its CEO and Chairman of the Board of Directors, has notified the Company that he would like to step down as CEO at such time as the Company secures a qualified successor. Mr. Smith will remain in the CEO role until a successor is named, and will continue to serve as an active Chairman of the Board after the CEO transition occurs.
"I am proud of all we have accomplished since Jean-Christophe Bandini and I founded the Company in 1993 and am optimistic about Tumbleweed's future," said Mr. Smith. "With Tumbleweed established as a market leader in email and file transfer security, I feel it is the right time to step back from daily operations to spend more time with my young and growing family."
Conference Call Information
Tumbleweed management will host a conference call at 2:00 p.m. PST (5:00 p.m. EST) today to discuss these results. The call can be accessed by dialing 800-267-9517 and giving the company name, "Tumbleweed." Participants are asked to call the assigned number approximately 10 minutes before the conference call begins. A replay of the conference call will be available two hours after the call for the following five business days by dialing 800-642-1687 and entering the following pass code: 3192268. Also, the conference call will be available over the Internet at http://www.tumbleweed.com in the Investor Relations area of the site or by going to http://www.mkr-group.com.
Non-GAAP Information
The non-GAAP financial information included in this press release is not prepared in accordance with generally accepted accounting principals ("GAAP") as it excludes merger-related and other costs, amortization of intangible assets and stock-based compensation expense. Management believes that the presentation of non-GAAP information may provide useful information to investors because Tumbleweed has historically provided this information and understands that some investors consider it useful in evaluating Tumbleweed's expenses. Management also uses this non-GAAP information, along with GAAP information, in evaluating Tumbleweed's expenses. The non-GAAP operating results are presented for supplemental informational purposes only for understanding Tumbleweed's operating results. The non-GAAP results should not be considered a substitute for financial information presented in accordance with generally accepted accounting principles, and may be different from non-GAAP measures used by other companies. A reconciliation between net loss on a GAAP basis and non-GAAP net loss is provided in the attached financial statements.
About Tumbleweed Communications Corp.
Tumbleweed provides security solutions for email protection, file transfers, and identity validation that allow organizations to safely conduct business over the Internet. Tumbleweed offers these solutions in three comprehensive product suites: MailGate, SecureTransport and Valicert Validation Authority. MailGate provides protection against spam, viruses and attacks, and enables policy-based message filtering, encryption and routing. SecureTransport enables business to safely exchange large files and transactions without proprietary software. Valicert Validation Authority is the world-leading solution for determining the validity of digital certificates. Tumbleweed's enterprise and government customers include ABN Amro, Bank of America Securities, Catholic Healthcare West, JP Morgan Chase & Co., The Regence Group (Blue Cross/Blue Shield), St. Luke's Episcopal Healthcare System, the US Food and Drug Administration, the US Department of Defense, and all four branches of the US Armed Forces. Tumbleweed was founded in 1993 and is headquartered in Redwood City, Calif. For additional information about Tumbleweed go to www.tumbleweed.com or call 650-216-2000.
Safe Harbor Statement
Tumbleweed cautions that forward-looking statements contained in this press release are based on current plans and expectations, and that a number of factors could cause the actual results to differ materially from the guidance given at this time. These factors are described in the Safe Harbor statement below.
Except for the historical information contained herein, the matters discussed in this press release may constitute forward-looking statements that involve risks and uncertainties that could cause actual results to differ materially from those projected, particularly with respect to Tumbleweed's financial outlook, markets, products, services, as well as its ability to successfully undertake a CEO transition. In some cases, forward-looking statements can be identified by terminology such as "may," "will," "should," "potential," "continue," "expects," "anticipates," "intends," "plans," "believes," "estimates," and similar expressions. For further cautions about the risks of investing in Tumbleweed, we refer you to the documents Tumbleweed files from time to time with the Securities and Exchange Commission, particularly Tumbleweed's Form 10-K filed March 15, 2004 and Forms 10-Q filed May 10, 2004, August 12, 2004 and November 9, 2004.
Tumbleweed assumes no obligation to update information contained in this press release, including for example its guidance regarding its future performance, which represents Tumbleweed's expectations only as of the date of this release and should not be viewed as a statement about Tumbleweed's expectations after such date. Although this release may remain available on Tumbleweed's website or elsewhere, its continued availability does not indicate that Tumbleweed is reaffirming or confirming any of the information contained herein.
Broadcom Announces StrataXGS III - The World's First Integrated Ethernet Switch Solutions Featuring Embedded Security
Wireless/Networking / Just Announced
Tue 25 Jan 2005
IRVINE, Calif., Jan. 24 -- Broadcom Corporation announced its new StrataXGS III switch architecture featuring the world's fastest, highest performing family of fully integrated Ethernet switch chips. Evolving from four prior generations of Broadcom Ethernet switch technology, the new StrataXGS III switches are the first to incorporate ubiquitous security, wire-speed IPv6 routing and wireless LAN support. The new StrataXGS III switch architecture features an advanced multi-layer 72 Gigabit per second (Gbps) full-duplex packet processing architecture. These next-generation capabilities are only available in StrataXGS III switches.
Information Technology (IT) professionals are often required to minimize capital expenditures and reduce operating costs of network infrastructures. To achieve these objectives, IT professionals need to simplify the management of desktop PCs, VoIP phones, wireless LAN access points and security appliances. The deployment of new applications, as well as the convergence of voice, video and data, has intensified the need for reliable, secure, high performance networks. Ethernet switching is the most pervasive solution to achieve this convergence due to its wide use and cost-effectiveness. The StrataXGS III Ethernet switch chips further accelerate this convergence through their superior performance and enhanced security features, delivering the reliability demanded by enterprise and carrier environments.
Announced today is the first StrataXGS III product family, the 500 Series. Designed for feature-rich, high performance Gigabit Ethernet (GbE) and 10GbE switch applications, the 500 Series includes five new chips, the BCM56500, BCM56501, BCM56502, BCM56503 and BCM56504, each targeting different port and functionality requirements. The flagship product, the BCM56504, is the only switch in the industry to incorporate 24 GbE ports and four 10GbE ports in a single-chip device. This specific configuration is required by network integrators to support concurrent stacking and redundant 10GbE uplinks. Each GbE port can operate at 10/100/1000 Megabits per second (Mbps) while each 10GbE port can operate in either 10GbE mode or stacking mode. Additionally, the BCM56504 is based on a 72 Gbps packet processor that is capable of processing over 100 million packets per second, which is unrivaled for integrated multi-layer switches.
"With StrataXGS III, we are delivering an exciting new generation of switching silicon that enables reliable and secure communication of voice, video and data traffic on a single high-performance network," said Martin Lund, Vice President and General Manager of Broadcom's Enterprise Switch Line of Business. "Building on the success formula of the previous generations of StrataSwitch and StrataXGS, StrataXGS III features an impressive collection of unique technologies that will power the world's most advanced enterprise and carrier networks over the next several years."
Focus on Robust Security, Resiliency and Converged Unified Networking
With the increasing rate of targeted attacks on public and corporate networks, Broadcom has responded to the need for resilient secure networking by integrating a wealth of unique security-based intelligence into all StrataXGS III products. Broadcom's exclusive wire-speed Layer 2 to Layer 7 application-aware security technology is designed to enforce secure policies based on a flexible variety of programmable rules. Also featured is integrated Denial of Service attack prevention technology that provides continuity of service to users in case of an attack. To complete the security features within all StrataXGS III products, advanced cryptographic technology is integrated that meets the stringent requirements defined by the U.S. Government's FIPS 140-2 standard.
Building upon next-generation security features, the StrataXGS III architecture enables seamless integration of a unified wireless and wired infrastructure. In the past, WLAN adoption has been limited due to the cost and complexity of deploying expensive appliances and managing a separate WLAN network. The StrataXGS III architecture solves these problems by integrating secure WLAN services and fast roaming technology, eliminating the need for costly appliances. As a result, IT professionals can now deploy cost-effective and easy to manage WLAN services, such as new VoIP wireless phones, on a single unified network.
As the Internet continues to experience incredible growth, it is expected that there will be a shortage of IPv4 addresses in the future, prompting a new protocol solution called IPv6 that provides virtually unlimited address space. In support of this trend, the StrataXGS III architecture is ahead of this transition by fully integrating both IPv4 and IPv6 routing capabilities. This cost-effective implementation will enable the easy migration to IPv6 in corporate and service provider networks. In addition, intelligent IP multicast technology is also featured within StrataXGS III switches, enabling service providers to offer new triple play capabilities (voice, video and data) and video broadcasting services.
To reduce system development costs and accelerate time to market, Broadcom provides a comprehensive application programming interface (API) that maintains software compatibility with previous generations of Broadcom switches. In addition to providing a common API, Broadcom provides reference designs for the StrataXGS III product series including software, schematics, layout files and related documentation.
StrataXGS III Summary
The StrataXGS III family of switch chips is ideal for standalone, stackable and chassis switch configurations supporting enterprise, service provider and grid computing markets. In addition, these devices are well-suited for use in embedded applications such as blade servers, IP DSLAM (Internet protocol digital subscriber line access multiplexers), PON (passive optical networking), and AdvancedTCA (Advanced telecom computing architecture), providing reliable local, backplane and inter-shelf switching.
Pricing and Availability
The 500 Series of StrataXGS III Ethernet switches (BCM56500, BCM56501, BCM56502, BCM56503 and BCM56504) are currently sampling to Broadcom's early access customers. Pricing is available upon request.
About Broadcom
Broadcom Corporation is a leading provider of highly integrated semiconductor solutions that enable broadband communications and networking of voice, video and data services. We design, develop and supply complete system-on-a-chip (SoC) solutions incorporating digital, analog, radio frequency (RF), microprocessor and digital signal processing (DSP) technologies, as well as related hardware and software system-level applications. Our diverse product portfolio addresses every major broadband communications market, and includes solutions for digital cable and satellite set-top boxes; high definition television (HDTV); cable and digital subscriber line (DSL) modems and residential gateways; high-speed transmission and switching for local, metropolitan, wide area and storage networking; home and wireless networking; cellular and terrestrial wireless communications; Voice over Internet Protocol (VoIP) gateway and telephony systems; broadband network and security processors; and SystemI/O server solutions. These technologies and products support our core mission: Connecting everything.
Broadcom is headquartered in Irvine, Calif., and may be contacted at 1-949-450-8700 or at www.broadcom.com.
Infineon TPM product brief
from 11/20/04
http://www.infineon.com/cmc_upload/documents/011/4135/tpm-pb.pdf
Problem identified
Jeffrey Lim, Jan 24 2005
Who am I? More than just the title to a Jackie Chan film, that is a question that IT systems must correctly answer for anyone seeking to gain access. This issue of identity management has been around ever since users were allowed online access to computer systems, starting with the rudimentary user ID and password system.
Back then, access was limited to those who had access to terminals that were physically connected to the computer, providing an additional layer of physical security. Today, however, the demands for telecommuting and mobile computing have potentially thrown corporate IT networks open to anyone with Internet access.
Interestingly enough, the user ID and password system continues to be the most popular form of identification and access for IT systems. While this reflects on how well the system actually does work in managing the issue of identity and access management (IAM), there have been concerns on its adequacy, especially in the face of the openness of today’s IT networks. “In the past, security was a by-product or afterthought,” said Anthony Lim, CA’s brand director, security for Asia South. “But now, the threats have grown exponentially, and security, identity and access management are big issues.”
Various measures have been introduced to tighten the security of the venerable user ID and password system, including having different user IDs for different systems and applications, ensuring that passwords are of a minimum length with both alpha and numeric characters, and forcing users to change their passwords on a regular basis without repeating previously used passwords. But these are often at the expense of convenience to end-users, and may even result in a further expense to the organisation.
It has to be easier
“There were many cases where users could not remember their many different passwords to log on to multiple applications, and many password resets were requested,” said Melissa Foo, risk management service manager at the CIO office in Singapore’s Economic Development Board (EDB). “This increased helpdesk costs considerably.”
It is no wonder, then, that in seeking to balance security with convenience, organisations have turned to solutions that provide the convenience of single sign-on (SSO) with at least a two-factor authentication, using tokens, smart cards, biometrics, or some other physical device as a second factor to identify the user. EDB, for example, has deployed Encentuate’s TCI enterprise access security solution that has an access agent client software residing on the end-user’s PC that can only be logged on using a physical USB key and a passcode.
Once the user has logged on to the access agent, a server sends it a “wallet” containing the user’s personal identity profiles, including the user IDs, passwords, certificates and encryption keys to the various systems and applications the user has access to. The access agent then acts on the user’s behalf to login and logout of systems and applications automatically, even handling password changes according to the rules set down by the organisation. In this way, users need only have their USB key handy while only remembering a single passcode, while the various user IDs and passwords of the different systems and applications can be made as complicated and unrecognisable as the organisation wants.
“Users in EDB now enjoy a more secure and yet convenient way to logon to multiple applications with the simple two-factor authentication mechanism of a USB key and a passcode,” said Foo, adding that user’s feedback has so far been encouraging.
Over at Singapore’s JTC Corporation, the two-factor authentication comes in the form of the user’s mobile phone when a user does a remote logon. Here, after first logging on with a user ID and password via the Web, another one-time password would be sent to the user’s registered mobile phone which he then needs to enter, within a specified time limit, to gain access to the corporate network.
According to Yap Chee Yuen, JTC’s group CIO and chief knowledge officer, security with ease of use for the end-user was a key decision factor. “If it makes their life harder, it will not be acceptable to them,” said Yap, adding that JTC set up a forum for users to give their feedback when they implemented their remote access solution. So far, all the users seem to like the remote access solution, which combines Encentuate’s solution for identity management together with Citrix Metaframe to provide remote users the same look and feel as if they were logging in locally from the office.
JTC is currently in the process of implementing an SSO solution with a USB key as the second factor for authentication, whereby users need only remember their user code and PIN for the USB key. Desktop PCs within a secured office environment would be installed with software to provide the same functionality in place of a USB key. “It’s like going to a country club where you have a membership card that allows you to use all the facilities once you have identified yourself,” said Yap.
Yap highlighted that the ease of use of the IAM solution must also be extended from the end-user to the administration and set-up of the system. Self-service facilities, where users can update their profiles themselves, should be included as these would help reduce on-going administrative costs. There was also a need to ensure good communication with users during implementation, and to provide them with training and a user guide of the IAM solution.
EDB’s Foo added that it was important to have a good understanding of users’ computing patterns. There was also a need for good change management, where any teething problems could be addressed quickly and completely.
Do it once, do it right
CA’s Lim felt that it was important to pay attention to the implementation of an IAM system, which he felt could turn out to be a nightmare. Noting that an organisation would be made up of management who want to have a secure IAM system in place, the engineers and IT personnel who have to implement the system, and end-users who will be using the system.
He said that the starting point for implementing any IAM system was to have these different people groups agree on what they want to have and what they are going to do for IAM; and from there, define their requirements.
The requirements would subsequently be expanded to take into account the security considerations that the IAM should cover, for example, handling dead accounts when staff leave, and other considerations like whether the IAM would be extended to contractors or an extranet. Details like whether external access should be to a separate system or part of the corporate network would then be worked out.
As far as implementation is concerned, Encentuate’s CEO Peng T. Ong warned against having a “big bang” implementation. He suggested instead having a fast roll-out to some users, then subsequently expanding that in breadth to more users, and in depth with more security features.
Watch your back
Besides SSO, John Philips, corporate technology strategist at Novell, noted that an IAM solution should also encompass tidying up the back-end. When staff leave, securing the desktop to prevent unauthorised applications from running that could be used to attack the network is important. There is a need to have all three components in place if you want to streamline the organisation, said Philips, adding that a full implementation may extend over three to five years.
Elaborating on the back-end, Philips cautioned against having a central authentication portal or server, as that could become a potential performance bottleneck, preferring instead to have the various applications and systems continue to maintain their own access and authentication processes together with information like passwords and privileges.
The IAM server would contain user ID information together with linked systems and applications. These would provide provisioning, through defined user roles and policies, password management, the management of moves, adds and changes to maintain an audit trail for these applications and systems. Philips also stressed the need for self-service capabilities where users can reset their own passwords or HR can add users and assign them systems and privileges.
In looking at an IAM solution, it is clear that there is more to it than meets the eye. JTC, for example, looked at it for a year before moving ahead with implementation.
“IAM must be seen as part of the bigger security and infrastructure management practice of the whole organisation,” said CA’s Lim, a sentiment shared by Encentuate’s Ong who advised against buying and deploying multiple point solutions.
Ultimately, though, how well an IAM solution works will depend not so much on the technology and policies that are put in place, but on how well it is received and used by the end-user. “At the end of the day, it is the user’s responsibility. If they do not protect their mobile phone or token, there is a chance that security will be compromised,” said JTC’s Yap.
CardSoft Reduces Application Development Costs for Secure Payment Solutions
CardSoft™ today announced availability of the latest release of the company’s eAppliance™ STIP Platform (eASP) for developing and deploying secure and cost-effective payment applications on EFT/POS (electronic funds transfer/point-of-sale) devices.
i-Newswire, 2005-01-24 - With this new software release, CardSoft strengthens the company’s lead in payment systems with the first commercially available development environment based on version 2.2 of the STIP (Small Terminal Interoperability Platform) technology endorsed by GlobalPlatform, the global leader in smart card infrastructure development.
The eAppliance STIP Platform significantly reduces development and support costs for payment solutions by enabling developers to write applications that run across a range of STIP-enabled payment terminals without modification. Developers can support the same application from one generation of terminal to the next and ensure software investment protection.
“CardSoft is delivering on the promise of the company’s STIP technology to reduce application development costs for payment systems providers,” said Don Sweet, CEO and President of CardSoft. “The eAppliance STIP Platform provides a much more productive environment based on Java technology and significantly improves time-to-market for new payment applications.” The platform integrates with Borland® JBuilder®, the leading Java integrated development environment.
The eAppliance STIP Platform transforms EFT/POS payment terminals into multi-function commerce devices running multiple, secure applications. Traditional credit/debit/ATM card transactions can run securely side-by-side with other STIP-based applications such as customer loyalty.
Shipment of CardSoft eASP version 1.2 begins this month. For more information, contact telephone 650-357-7222.
About CardSoft
CardSoft is a leader in the development of software technology for enabling secure transactions on small computing devices. With the company’s eAppliance solution, CardSoft has succeeded in establishing a common programming environment for a wide range of small electronic devices reflecting the “write once, run anywhere” philosophy of Java technology. CardSoft is located in California’s Silicon Valley with additional offices in Asia and Canada. CardSoft is a member of the the FINREAD Consortium (www.finread.com), and the J-Consortium (www.j-consortium,org). All CardSoft brands and products are trademarks of CardSoft, Inc. in the United States and other countries.
All other marks are the property of their respective owners.
# # #
If you have questions regarding information in these press release contact the company listed below. Please do not contact us as we are unable to assist you with your inquiry. We disclaim any content contained in this press release.
More Information
http://www.cardsoft.com/
Press Release Date
2005-01-24
Security Concerns Prompt Internet Explorer Defections
Sun Jan 23, 1:22 PM ET Technology - Reuters
By Reed Stevenson
SEATTLE (Reuters) - Worried about catching viruses, spyware, or other malicious software while surfing the Web?
If you're among the nine in 10 people using Microsoft Corp.'s (Nasdaq:MSFT - news) Internet Explorer, you may be a candidate to join the increasing number of users turning to alternative Web browsers that experts say are less prone to security flaws and offer newer features.
Firefox, a free Web browser developed by a far-flung group of software programers, has been chipping away at Internet Explorer's dominant position since its debut last year.
Although Firefox offers some features not found in Microsoft's dominant Internet browser, such as the ability to display several Web pages within a single window, many users say that they are switching because of Internet's Explorer's security holes and malicious software targeting such software flaws.
"The big thing for me was spyware," said Adam Philipp, a Seattle attorney who switched to Firefox in order to avoid the infiltration of programs that generate unwanted pop-up ads and secretly record a computer users' activities.
"I was looking for an alternative," said Philipp, "When I found Firefox, it was faster, more functional and more secure."
The increase in the number Firefox users came despite Microsoft's three year-long effort to boost the security and reliability of its products under an initiative called "Trustworthy Computing."
To be sure, Microsoft has started to deliver automated software updates for Internet Explorer as well as for the Windows XP (news - web sites) operating system. Last year, the Redmond, Washington company deployed a major interim update to Windows XP that included security enhancements for Internet Explorer, including a pop-up ad blocker.
But critics say such moves by Microsoft were too little, too late, which have led to the rapid rise in the popularity of Firefox and other Web browsers.
According to Web statistics tracking firm WebSideStory Inc., Internet Explorer held a 90.3 percent share of U.S. browser usage at the middle of January, compared with a 95.5 percent share in mid-2004.
Nearly 5 percent of Web surfers now use Firefox.
In addition to having fewer security risks, proponents of Firefox say that its other innovations are attracting users with features such as the ability to open multiple Web pages within a single window on the desktop and rich variety of plug-ins to enhance the browser's functionality.
BROWSER WARS AGAIN?
But don't expect a repeat of the frenzied browser wars of the late 1990s. Matt Rosoff, an analyst with Directions on Microsoft, an independent research company, said that Firefox's growth will probably be limited because big companies will stick to Internet Explorer.
"Corporations like to standardize," Rosoff said, "It's extra work to roll out an extra browser."
For technophiles looking for alternatives, there are also other browsers available. Norway's Opera Software (OPERA.OL) makes a competing browser and there are also browsers based on Internet Explorer, such as Maxthon.
Apple Computer Inc. (Nasdaq:AAPL - news) has its own browser, called Safari, for its Macintosh (news - web sites) computers.
Microsoft has said it will focus on enhancing Internet Explorer's security features and on a major upgrade for the next release of Windows, code-named Longhorn, due out in 2006.
Competition between Microsoft and Firefox isn't anything new, when you consider that the rivalry actually goes back a few years.
Firefox is based on the Mozilla browser, which itself is based on much of the underlying software code from Netscape, the Web browser that was instrumental in the Internet's growth in the 1990s.
Instead of a company, however, a network of programers called the Mozilla Foundation jointly develops the Firefox browser, in order to create an alternative to the dominant browser platform.
Netscape was overtaken by Microsoft's Internet Explorer in the late 1990s, sparking the Justice Department (news - web sites)'s landmark antitrust case against Microsoft.
Critics of Internet Explorer argue that Microsoft essentially stopped making innovations to the browser after it gained its overwhelming market share.
Meanwhile, Mozilla's backers have gone on the offensive and took out a full page advertisement in the New York Times a couple months ago promoting the upstart browser.
And its also appears to be benefiting thanks to another popular marketing channel -- word of mouth.
"Any time I hear somebody complaining about their Web experience (on Internet Explorer), it will almost certainly trigger an invitation from me to try out Firefox," said Philipp.
Doing so doesn't cost anything. Firefox can be downloaded free from http://www.mozilla.org/products/firefox/.