About
Subscribe

AccessData curbs security breaches

Alex Kayle
By Alex Kayle, Senior portals journalist
Johannesburg, 20 Nov 2009

AccessData curbs breaches

AccessData has rolled out its network-enabled incident response solution called AccessData Enterprise 3.0, says Earth Times.

Companies and government agencies can use the technology to quickly validate security breaches, identify and analyse compromised computers, and address threats.

In addition, the solution is used to address internal threats, by allowing organisations to uncover and investigate fraudulent behaviour, confidential data leakage, the use of unauthorised applications and intellectual property theft.

Livescribe intros app store

Livescribe has released the beta versions of its online application store, providing consumers with the ability to download more than 30 paid and free applications, which extend the functionality of the Pulse smartpen beyond its core feature of recording and linking audio to handwriting, states

PR Newswire

Applications range from productivity and reference tools to games and entertainment to travel and education.

In addition to the beta launch of the application store, Livescribe released the 2.0 version of its mobile computing platform, including software upgrades for both the smartpen and the Livescribe Desktop software - which allows consumers to save, organise and share their notes and recordings from their computer, as well as download and install applications.

Onix rolls out security key

Onix International has unveiled the EncryptStick software application on a preloaded USB flash drive, aimed at driving business data security, reports PR Newswire.

With 4GB of onboard storage, the EncryptStick flash drive acts as a key to the end-user's computer in order to protect any type of file or password from theft or accidental loss.

Tyrone Phipps, CEO of Onix International, says: "The need to securely store and transport files is becoming increasingly important as cyber criminals get more advanced with their techniques for data and theft.”

Share