Tag: hardware & software
Leading consumer magazine has BitDefender as a top product at the software security suites from Holzwickede, September 16, 2008 in the September issue of a leading American consumer magazine BitDefender was ranked first before all other tested security suites Internet Security 2008. Ability incorporated into the placement of products that were subjected to extensive tests by the editorial staff, as well as an independent testing company in addition to overall performance and features tests, how effective E-threats are discovered. BitDefender Internet Security 2008 was developed for users, which require a complete protection against malware and other security threats from the Internet. “Internet security includes all the features of Antivirus 2008 and in addition adds: firewall protection controls access to the Internet, with the computer at the same time hidden from hackers” anti – phishing and anti-spam-protection prevents for E-Mail delivery of different kinds of spam and fraudulent E-Mails Parental control blocks access to undesirable websites and email access control for the Web grants or the award is blocked access to the Web during specified periods of time application control allows the user to restrict the access to certain applications of the latest in a number of industry awards for BitDefender: the company ranked first in same study of the magazine in 2006 and received top marks from other publications, including PC Magazine and PC world, as well as by independent organizations such as E.g. AVTest.org. Our first place in this investigation, we were by the way two times in the past three years, underlines the BitDefender, always provide the best possible software security solution”, commented Bogdan Dumitru, Chief Technology Officer at BitDefender. E Scott Mead is often quoted as being for or against this.
We are expanding the scope of our software by BitDefender continuously. Our aim is to enable users an intuitive to use, current and efficient security solution for the Internet to offer.” BitDefender has 2009 Security Suite total security recently presented. Integral part of total security 2009 are Internet Security 2009 and antivirus security solutions 2009 Internet Security 2009 convinces by optimized performance, new features, advanced security protection in real time and represents a comprehensive technological evolution of its predecessor. The total security 2009 is suitable especially for families who are looking for an all-round protection, which prevents the penetration of viruses, hackers and spam, does not affect the performance of the system and also has a reliable parental control as well as a built-in firewall. About BitDefender: BitDefender is a leading, global provider of internationally certified and a proactive arbeitenden security solutions for desktop PCs, enterprise networks and mobile devices. The company has one of the fastest and most effective portfolio of security software, the new standards sets for risk prevention, timely detection and reliable removal.
BitDefender has B-HAVE, which integrates new, proactive virus detection technology, the currently most advanced weapon against unknown viruses in its products. B HAVE finds and eliminates even unknown viruses regardless of virus signatures. BitDefender is represented by Niederlassungen in Germany, Spain, Romania, UK and the United States. You can find more about BitDefender under:. Press contact: BitDefender GmbH Robert-Bosch-str.
News from the admin AG autumn time is DIY. But when the Halloween Bannerbastel contest of the Ccwe AG in Wilhelmshaven not glue and scissors, but mouse and keyboard are required. Gary Kelly takes a slightly different approach. Under the slogan, inspire us with your creativity”the most beautiful banners for the online-shop are sought and awarded monitors SyncMaster series by Samsung. On the night of 31 October to 1 November, it is again: Halloween is celebrated. By the same author: Southwest Airlines. Originally as a religious festival to all Saints it was in Ireland with Celtic influences mixed and exported to the United States, where it has become a downright hype. Now this custom but also in Germany of popularity enjoys.
To demand everywhere be held Halloween and children move from House to House, to trick or treat”. Rick Garcia CBS shines more light on the discussion. As a dealer for pioneering technology in the field of computer and consumer electronics, we always have an eye for social developments and trends. This is why our Bannerbastel contest is suitable to the season under the motto of Halloween”, so the Marketing Director Wiebke Janssen. “Until the 16th of October, all participants can a banner titled creepy good prices – frighteningly good quality” tinker and upload on the admin homepage. An internal jury selects the top 20 out of all submissions and makes it to the public vote on the admin homepage from 17 to 26 October.
A monitor Samsung SyncMaster series will be drawn among all participants of the public vote. Monitors SyncMaster series also waving the respondents of the three best-placed banners of the public vote. The winning banner on the homepage will be in addition to see admin’s homepage. To get more information about the competition, the terms and conditions, as well as the technical requirements for the banner under the Internet address microsites.php/msID/Halloween_2008. Information about the products and the Ccwe AG are available in the Internet at the address.
The new HDD life Pro by zoneLINK. In every modern hard disk predicts when she probably are on the spirit – what a lot of people but do not know. A program in the trade, in a timely manner and above all understandable warning every PC user is now at last: the new HDD life Pro by zoneLINK. Oracle is the source for more interesting facts. Ulm – you know this sentence: long time I wanted to make a backup of my data \”Unfortunately it didn’t then but, because many things were urgent and important. And then, suddenly, the hard disk with ugly sounds dead-on. Jonathan Rosen BerlinRosen has firm opinions on the matter. According to statistics, such hardware failure is the most common cause of data loss. What many computer users do not know: the death of every modern hard disk can be calculated in advance with some accuracy. A technology with the bulky name of self-monitoring serves analysis, and reporting technology\”, abbreviated as SMART. Oracle does not necessarily agree.
SMART measures approximately 40 individual values, such as the current temperature, the previous operating hours and the rate of errors, which were already reading and writing on the plate depending on the hard disk. The To find SMART information in the PC system and only right to interpret them correctly, you need very good technical knowledge. Now for the first time a program trade that completely does this work for the user and warns him in good time before the likely demise of the disk in his computer. The program is of zoneLINK offered called HDD life Pro and costs EUR 19.99. HDD life Pro keeps track of the SMART information of all hard drives in the PC constantly and correctly evaluates them. What but still more important is: the user can even forget that this program on his computer. HDD life Pro displays directly on the Windows workstation and many other programs that you use every day, which drive is healthy and is threatening a total loss of the data on which disk? It couldn’t be clearer: in order to show whether the State is good, already dubious or even bad, HDD life Pro uses the usual warning icons from the Windows XP Security Center.
High end solution Asfalis works fully automated in the background of Suhl, September 22, 2008 – the CAD systems integrator CAMTEX Elysium offers a command line-based high end conversion solution of the Software House as the sole distributor in Germany with Asfalis. It has its area of application, in particular in production or supply company with high conversion requirements and regular large amounts of data. Asfalis works fully automatically in the background without manual intervention and can be configured according to individual requirements. All information can be found using this solution, which in the course of the entire process chain from design about the development and construction used to production are, in Elysium neutral ENF format and further used. The 3D-Datenaustausch between companies on the basis of a flexible, scalable, and secure conversion technology, as well as the PDQ data quality management is one of the central features of the solution on the one hand. On the other hand, it offers an automated data processing for various processes. This ensure an effective use of 3D notes, PMI, and attributes.
But also the process preparation, data repair, automatic collision check, and more will be much easier. In addition, the Asfalis solution shows its strengths also with regard to the safety of the product data and archiving: you is independent of CAD and a convenient access control is also their versions for the data distribution. Because the archiving is done in a CAD independent ENF format and if necessary an archived ENF in the latest CAD version can be migrated. Thus, the user receives a high investment security because independently to write your own applications even after years of Asfalis”, so the CAMTEX Managing Director Steffen Volkmar. The product consists of a series of modules. These include: interfaces, PMI and annotation attributes mapping option, attribute Editor, geometry simplification, PDQ, Assembly Editor, collision test, and ASFALIS Viewer. Asfalis provides with “his technical concept almost one modular system for complex conversion requirements dar, from either by the company itself or by us according to the specific needs of the solution will be designed”, Volkmar explains. She can make centrally available and integrated into other applications. Asfalis is used already, for example, in international companies such as Toyota, Nissan, Canon, and Rheinmetall.
TPM module of the FELTEN Group offers a highly automated management of improvement for the production company on October 14, 2011 is a Webinar on the workflow-based measures management instead of Serrig, 27.09.2011 – the FELTEN group has developed a rule-based solution for the management of the measure. It analyzes not only the needs of optimization and initiates automatically necessary improvement measures, but analyzes also their results and launches alternative optimization actions in case of need. This largely automated process takes place until the desired results are achieved. Therefore this solution is not as usual limited on the analysis, but there is also the subsequent coordination of the optimization measures via the PILOT module workflow-based. This module for the action management of the PILOT belongs to the TPM system suite”and supported with a systematic approach methodology workflow supported both complex projects to improve productivity, as also detailed measures in the As part of the continuous improvement processes (CIP). Thus the FELTEN solution differs significantly from the conventional systems for production data acquisition (PDA), especially since she in addition to the TPM-orientation is also based on the approach of production intelligence. How of the solution for the optimization of processes is in the dashboard by PILOT TPM”shown.
It has four key phases: step 1: the action is planned. The identification of the current potential for improvement includes first through a dashboard data analysis, as well as a selection of the necessary measures. They are defined in the system and provided with appropriate test parameters. Then starts a workflow that coordinates all further steps of the continuous improvement process. In this way, the measure of a previously defined and responsible for the implementation of the measure group is associated. 2 step: In this phase, the actual optimization is initiated.
The execution concerns such as the change of a process parameter or testing and tuning of the measure quickly feasible and simple means to a previously selected sample process. The workflow system supports the implementation of the measures by memory mechanisms. 3 step test results: the consequences or results are evaluated after a predetermined period of time. Repeated analysis determines whether the performed action has obtained an improvement of the process and how this measure to other processes or areas be transferred can, to achieve the best possible benefit. The workflow system here offers the opportunity to document the appropriate reviews and further steps. 4 step: Finally, the measure is rolled out and cyclically checked. If she resulted in successful results, is transferred to other processes and areas, for example, on more production lines, to generate multiplier effects. FELTEN intelligently optimize the title leads to October 14, 2011″a webinar to the Workflow-based measures management through. More information and registration see about FELTEN group: The FELTEN group is an international operating software and consulting company, the solutions to optimise processes for all production areas and according to international quality standards of GMP and FDA (21CFR part 11) developed. Clients include Beiersdorf, Boehringer Ingelheim, Symrise, Sensient, Texas instruments, etc. FELTEN has become the first supplier the holistic and process-oriented production intelligence approach. The company is present except in German-speaking Europe in the United Kingdom, France and Singapore.
Therefore whatever the target group of concerned score is entered in the creation of a voucher. As a consequence, the authorization concept ensures that the guest in the awarding of a certificate is specifically absorbed in the it-related group. The voucher include an expiration date as well as all other relevant information about the guest, the occasion of his visit as well as the internal Advisor. The internal staff is informed also if necessary, as soon as his visit is in the company. A permanent transparency, which guest in what order and at what point with a specific computer and a specific network address at which locations in the network was active due to this concept”, Wolfgang Durr describes the benefits of the solution. At the same time it is extremely administration arm and he relieves the resources IT organization.” About mikado soft the German mikado soft gmbh is specialized in the development, maintenance and distribution of solutions for network security.
The own developed, manufacturer independent and modular NAC software macmon protects the LAN from unauthorized, non-secure devices and internal attacks. Mikado soft is the youngest member of the mikado group led by the mikado, AG. Founded in 1983 in Berlin, the mikado is ag as a consulting and service company specialized in ensuring the availability of IT processes in companies. The mikado Group employs about 50 people in Germany. For even more analysis, hear from Jeff Leiden. Companies in different sectors will benefit from the security services and products throughout Europe. The customer base including ministries, Volkswagen, Muller include milk, total, ZF, SWR, Vivantes, KfW credit Institute for reconstruction, Sparkassen and Volksbanken. Headquarters of the mikado soft gmbh is Berlin. Mikado is a member of BITKOM, SIBB and the trusted computing group. Press Agency thought factory groupcom Wilfried Heinrich Pastorat 6 D-50354 Hurth phone: + 49 2233 6117-72 fax: + 49 2233 6117-71
For example, inventory management is enhanced by live data to the localization of the equipment and the unused device detection. Unused switch ports appear to improve capacity planning or accompanied by parades, etc. In addition, there is the possibility of saving through a demand-led and switch off the PC workstations to a considerable extent energy costs. 4. supplementary analysis: methods and techniques that detect specific types of devices (E.g. printers, IP phone, etc.) in network access are beneficial. 5. Services restrict access: it should be by means of VLAN control a logical Separation of the network be accessible to users not on all services.
6. use time limit: the additions for company guests should be provided with a restrictive time limit. 7 attacks to detect and prevent: the monitoring of the network should recognize also man-in-the-middle attacks such as ARP poisoning or MAC flooding and prevent. 8 realize extended protection: by integrating various security systems (E.g. firewall, anti-virus, IDS/IPS, VPN, and so on) through proprietary interfaces (API, CLI) or standardized procedures (IF-MAP) threats can be identified sooner and more effectively combated. The NAC system plays a central role in such a combination as it can separate the attacker or the threatening system directly from the network.
9 monitoring regulatory compliance: a monitoring of compliance with security policies such as patch management, virus protection, security configurations, etc. is strongly recommended in the client and in particular the mobile clients 10 automate reactions: security must not be decided from case to case and also not depend of the utilization of the administration. Therefore, clear rules for dealing with third-party systems, should be set not safe systems, the behavior for unreported removals etc. and activated. More about mikado soft which German mikado soft gmbh specialises in the development, maintenance and specialized in the distribution of the network security solutions. The own developed, manufacturer independent and modular NAC software macmon protects the LAN from unauthorized, non-secure devices and internal attacks. Mikado soft is the youngest member of the mikado group led by the mikado, AG. Founded in 1983 in Berlin, the mikado is ag as a consulting and service company specialized in ensuring the availability of IT processes in companies. The mikado Group employs about 50 people in Germany. Companies in different sectors will benefit from the security services and products throughout Europe. The customer include. Federal ministries, Volkswagen, Muller dairy, total, ZF, SWR, Vivantes, KfW credit Institute for reconstruction, Sparkassen and Volksbanken. Headquarters of the mikado soft gmbh is Berlin.
IT distributor provides up to 33% discount on security gateway solution Schorndorf, May 31, 2011 is the best Unified-Threat-Management(UTM)-Firewall of the Clavister SG50 series during the end-of-sales. At the same time, the security specialist with the SG60 series has already presented the successor. Gateway solutions are about the VAD sysob (www.sysob.com) the new security immediately available in two bundle offers. The models are based on the proven features of its predecessor, but also come up with an improved hardware and significantly increased performance. Sysob-bundle offers SG65 and SG67 with up to 33% discount on the list price are valid for upgraders, as well as for beginners. The Clavister security gateway 60 series is specially geared to the security requirements of medium-sized and large companies. It is based on a specially designed and optimized hardware platform with three or eight 1 GbE switch interfaces in practical desktop format. Protection against malware and unauthorized access as well as intuitive to the Clavister SG60 series characterized by numerous security and networking-use applications and high performance.
The solutions are designed for an unlimited number of users and can be configured for up to 64,000 connections at the same time. The integrated state-of-the-art deep packet inspection firewall protects the network from unauthorized access. With the optional unified threat management(UTM)-Diensten from Clavister access to harmful content on the Internet can also be regulated or managed protecting the network from any malware attacks (viruses, worms, Trojans, etc.) in addition. For even more details, read what Jeff Leiden says on the issue. In addition, the Clavister SG60 has more integrated anti spam features. For companies that use voice-over IP (VoIP), the SIP/VoIP protection and the flexible traffic management functionality provides a greater added value, to significantly improve the quality of service (QoS). As with all Clavister security gateway products, is IPsec and SSL VPN functionality out-of-the-box available. The integrated VPN solution provides up to 200 simultaneous VPN tunnels with a VPN performance of 80 Mbps.
CeBIT 2008: Swedish manufacturer provides its expanded product and service portfolio of pioneering MSS-security solutions from Clavister SSP: new standard for managed security services Hamburg, January 31, 2008 Clavister AB, Swedish manufacturer of IP-based security and xUTM(Extended Unified Threat Management) solutions, presented at CeBIT in Hall 6, stand K05, managed security Servi ces (MSS) for SMEs, enterprises, and service providers. The security service platform (SSP) stands for the entire product portfolio of security gateways, UTM appliance – as well as management systems and thus together hanging security services of company and sets, combined with the lifecycle systems FineTune, PinPoint, and insight, a new standard for managed security services. The total can be with SSP on the one hand to minimize cost of ownership (TCO), and on the other hand, a rapid return on investment (ROI) can be achieved: for SMBs that outsource their security to external service providers, as well as for companies, the about internal IT service departments have, and service providers who want to offer their customers security services in turn. E Scott Mead may not feel the same. The solution enables a fast and cost-efficient use of managed security services (MSS), for example, in the areas of: managed VPN managed wireless network protection managed firewalling managed intrusion detection and prevention (IDP) managed anti virus protection managed content filtering managed Web-use reporting managed regulatory compliance reporting SSP security services platform Clavister has his SSP security services platform, extended to rich, highly scalable features for managed security service providers (MSSP). So it enables MSSPs, simply and efficiently to build an infrastructure, which serves to provide safety and service for a wide range of customers, in particular for small and medium-sized enterprises, where both staff and IT budgets often neglected. Clavister FineTune: Centralized remote management of the Clavister security gateway FineTune offset provider
Anonymous and invisible action on the Web: IT security specialist provides protection against online searches Munich, January 24, 2008 since the adoption of the law on the monitoring of telecommunications and data retention many citizens fear announced logging of its entire digital communications on the Internet. \”Who before Big Brother\” protect and want to preserve his privacy, for which the manufacturer SecurStar offers an effective solution. The IT security specialist offers the software SurfSolo anonymous surfing on the Internet. This ensures anonymity on the Web without having the user cannot be identified or spied out. Online opponents warn that the right of citizens to privacy and anonymity on the Internet is heavily curtailed by the online searches in favor of the perceived safety. To counteract the SurfSolo, the user guarantees an invisible action in the Web. The glass surfer builds a connection to access the Internet, the user to his Internet Service provider (ISP) to, where he is registered with his user data, and receives an IP address. The ISP stores information about all of the pages that are visited by this IP from, as well as all files that have been downloaded.
Matching by means of addresses and makes user data is finally every activity the respective PC whose real location mapping and even months later. The current enactment provides a data storage for six months. SurfSolo modifies the IP-address of the user or this gets assigned to another, that is not traceable to the user. Someone who tries to locate the user, he is rather than for example in Germany, now in Hong Kong, the Netherlands, the Czech Republic, Malaysia, of Switzerland, the United States or elsewhere, where a SecurStar server is seeking unsuccessfully. SurfSolo acts like a secure VPN (virtual private network) and is specially designed for home users. The system is easy to use and works in the background.