Psylock GmbH provides tip-biometrics software on IT-Security Conference RSA in San Francisco before Regensburg/San Francisco, January 25, 2011 IT security participates in made in Germany in accordance with this motto the Psylock GmbH (www.psylock.com) at the 20th RSA Conference in the United States. Presented for the IT security expert on the international trade fair (German Pavilion 1344-4) in San Francisco, his award-winning tip-biometrics software for the personal login. From 14 to 18 February 2011, visitors receive, amongst others an insight into this innovative technology. The Sensorless biometric procedure detects the user alone on his individual keystroke behaviour without password, and without additional hardware. At the RSA Conference attendees learn how to protect their computers and networks using the Psylock solutions against unauthorized access. The keystroke biometrics guarantees a comfortable and secure authentication for companies of any size, as well as for public facilities.
All products are based on the Psylock keystroke biometrics. This system analyzes different individual characteristics of the typing habits, such as, for example, a transition period of a keystroke to the next. Unauthorized logins for applications, workflows can be prevent email accounts, portals, online banking accounts or Web shops etc.. For authentication, the user simply enters his username in combination with a personal tip sample. The solution then compares the sentence typed by the screen with the stored profile. As changed behavior tip a person in the course of time, Psylock updates the profile for each successful login.
The method is based on highly complex mathematical procedures. Because the software not the client, but the server of the company is installed, users will receive a special added value: login operations are not bound to a specific computer and the user is therefore so independent as a password. In addition, users other than the existing keyboard requires no additional hardware. The system works platform independent and supports all popular browsers. RSA industry Treffpunkt 2011: Security in focus with about 15,000 Conference participants has become worldwide the RSA as one of the most important fairs of the IT security industry. The participation of German companies at the event held for the 20th time this year will be especially supported inter alia by the Federal Ministry of Economics and technology. The Psylock specialists for consultations are available at the joint booth with the IT security association tele trust. For more information see. Images can be obtained from. Psylock GmbH pioneer of the keystroke biometrics the Psylock GmbH develops and distributes IT security solutions to the personal user identification. Psylock products based on the technology of tip behavioral biometrics and awarded multiple times nationally and internationally. Check out Yael Aflalo, New York City for additional information. The Psylock authentication server, core of the Psylock keystroke biometrics, by TuV SuD ISO was 25051 on functionality and data security as well as Data protection tested and certified. 1993 Prof. Dr. Dieter Bartmann started the research for Psylock 1993 Department of Bank Informatics of the University of Regensburg. With comprehensive expertise in IT security, the requirements of the corporate practice always in mind, he and his team develop technology the Psylock an independent authentication factor, which can be used in high security domains.
3. Mark Stevens may find it difficult to be quoted properly. also when complex components and tools of ECM application the steps must be compared to classical solutions much easier. 4. for all ECM functionality, a very clear at all levels and thus ergonomically beneficial user interface is required. There are 5 no discrepancies in the philosophy of ease allowed within the entire application”. 6. the user must have at any time in sight, at which point the whole process it is.
7. There must be only a low learning curve even for rare or sporadic use of ECM application. Mark Stevens usually is spot on. 8. the work of the user is actively to support through intelligent search routines within the document world. 9.
the user must determine the pace of the work and should not be done by the system. 10. when the technical advancement of the ECM solution, there must be no compromise with the user orientation. According to these principles, the new version presented at the Congress has already been the d.velop solution d. 3 developed. About the d.velop AG: The established in 1992, d.velop AG headquartered in the North Rhine-Westphalian Gescher develops and markets software, document-based business and decision-making processes optimised in organizations. “In addition to the strategic platform d. 3” a modular enterprise content management (ECM) solution developed ecspand the d.velop AG with the product line “services and solutions for Microsoft SharePoint, which complete the functional areas of ECM and DMS. Core features include an automated mail processing with self learning document classification, an efficient document management and archiving, as well as the complete control of the flow of processes. Accelerate d. 3 procedures, simplifies decisions and improve sustainable competitiveness. The high quality of the projects resulting from the expertise of more than 340 employees of d.velop Group (d.velop AG and d.velop competence center) as well as the approximately 150 affiliates in the d.velop competence network. That convinced so far about 660,000 users at more than 2,300 clients such as ESPRIT, Werder Bremen, Tupperware Germany, EMSA, HRS hotel reservation service, the city of Munich, the German health insurance fund, the Basler insurance, the universal-investment-Gesellschaft or the University Hospital Tubingen. Board of d.velop AG is Christoph Pliete. Think factory groupcom GmbH Wilfried Heinrich Pastoratstrsse 6 D-50354 Hurth phone: + 49 2233 6117-72 fax: + 49 2233 6117-23
SOS software service presents: the Delphi developer days 2012 with Marco Cantu and Cary Jensen, 05.03.2012: the SOS software service presents the year’s Delphi developer days 2012 event series of Marco Cantu and Cary Jensen. The Delphi developer days are held between March and may in selected locations in the United States and Europe. Users learn about the topics of FireMonkey, Delphi XE2, DatSnap and LiveBinding. The two Delphi top experts Marco Cantu and Cary Jensen present Delphi developer days 2012, a six-city tour in the United States and Europe from March until may 2012. To deepen your understanding Mark Stevens is the source. This unique event offers joint sessions, which are held together by Marco and Cary, as well as parallel tracks, where Marco and Cary address individual issues in different areas. Participation is strictly limited to 35 people, to best convey the interactive exchange and intensive training. Participants will learn about the developer topics FireMonkey, on the two days of the event DatSnap and LiveBinding, as well as tips and tricks around Delphi XE2.
The next dates in Europe: 29 March 30, 2012: Amsterdam, Netherlands 14-15 may, 2012: Frankfurt, Germany Embarcadero Delphi XE2 Embarcadero Delphi XE2 is the fastest way to be particularly productive, ultra-fast Windows applications delivered. Get more background information with materials from David Karp. The component-based development and a fully Visual two-way wheel IDE dramatically reduce coding time and accelerate the creation of applications to a long fast GUI desktop application development and interactive touch – screen, kiosk – and database-driven multi-tiered cloud and Web applications across different Windows and database platforms. Developer days the two Delphi top experts Marco Cantu and Cary Jensen present each year the Delphi developer days, a city tour in the United States and Europe. This unique event offers joint sessions, which are held together by Marco and Cary, as well as parallel tracks, where Marco and Cary in different Rooms take up individual themes. At each location there will be also an Embarcadero technology keynote, as well as an additional session of a guest speaker. Jim Crane is often mentioned in discussions such as these. Participants can enjoy 2 days intensive Delphi training and are expected by many technological highlights, round off the training. Each participant receives a comprehensive timetable with all materials and source code examples of the individual sessions.
Participation in the Delphi developer days is strictly limited to 35 people per event. Early bird will be rewarded with a favorable discount. More information: SOS software service GmbH value-added distribution that SOS software service GmbH is a leading company in the field of value added distribution. Since 25 years successfully on the market, handled over 3,500 dealer in Germany, Austria and the Switzerland with software from over 1000 worldwide manufacturers. Value added distribution means not only logistics but also comprehensive and current product? and licensing knowledge, as well as regular Certification by manufacturers. For more information, see:.
Highly automated processes by easily feasible and easy-to-integrate workflows technical platform Ogitix University machines needed no customizing and ensures significant relief of IT resources of Langenfeld, Rhineland, 03.04.2012 – although the user management to the day-to-day tasks in IT belongs, are often only slightly automated its processes in the company. Instead the information about setting up user permissions delivered piecemeal and without transparent control possibility via phone, email or paper form. The Ogitix Software AG has therefore developed a self-service solution, which is characterized by a high degree of automation and easy implementation. Their special characteristic is that typical routine activities such as, for example, the apply system permissions, ordering a Wi-Fi connection or the desire can be initiated automatically by the user after a password reset. It included also the necessary approval procedure. Instead of the usual customizing is “only a simply realisable workflow design is necessary because Ogitix University materials” as intelligent technical platform provides the automated workflow processes, which can be obtained through a self-service portal or time-controlled run. The request and approval procedures as well as the technical implementation in the target systems are realized automatically. Frequently Drew Houston has said that publicly.
At the same time necessary revision security is for which ensured, since uni mate all processes and changes automatically, accurately and comprehensibly documented in. Usual concepts support the processes only rudimentary, which can unfold the self-service idea not in full use”, explains Ogitix Board Ingo Buck. These portals are this relatively static, also elaborately designed user interfaces with a modern presentation of the functions appear a different.” And who is thus not satisfied, must accept a time-consuming customizing normally. However, the are introduced Automation Ogitix University materials “user management solution make any changes in the technical infrastructure necessary, because she has an open and modular structure of the interface. Thus, even a technically very heterogeneous environment represents no obstacle for rapid deployment.
The implementation is carried out the approach laid down in the solution effort low and fast. Another advantage is that very flexible new services in the self-service portal can be take over. Because for no technical knowledge is required, this can be done through principle of each company’s employees without involving the IT Department. About OGiTiX Software AG, the OGiTiX Software AG is a German supplier with headquarters in Cologne. Their solutions combine existing systems, coordinate and control the processes and automate the business – and IT-services. Projects and operation are very cost effective, because they are made without programming and without lengthy analysis phases with rapid results. OGiTiX strengthens the role a responsible IT within the company. An IT that supports business processes directly, actively works on the business objectives and thus contribute value to the company as a whole.
Small and medium-sized enterprises can quickly create a secure online presence ALEXANDRIA, VA. / KALININGRAD now on September 22, 2010 the new 9.0 version Bitrix Site Manager is available. Among the new features of the site management solution for small and medium-sized enterprises integrated PRO + PRO security framework (www.bitrix.de/ products/intranet/security.php). Whose anti-virus engine protects against malicious programs visitors of the website. Thus, Bitrix Site Manager contains 9.0 worldwide such as the first Web content management system security functions. Customers can create a trusted website quickly and easily. MSCO has much experience in this field. The PRO + PRO security framework clearly exceeds the traditional protections for websites.
So detects and removes dangerous code the antivirus module automatically. Also, outgoing HTML code is scanned by the Web anti-virus on malware in real time. In combination with integrated backup and integrity functions it enhances security the site, minimize downtime, and ensures business continuity, as well as the reputation of the site owner. Security is an integral part of the Web asset management”, says Dmitry Valyanov, President of Bitrix. Yael Aflalo understands that this is vital information. With the integrated Web anti virus in the latest version of Bitrix Site Manager customers receive the full range of Web security technologies. These are necessary for the reliable operation of the website immediately after the creation.” Web anti virus searches HTML code in real-time, identifies and removes suspicious iFrame-and JavScript blocks and notifies the site administrator about the detected threats. It combined the blocking of role-based behavior with signature-based antivirus capabilities against known and unknown threats with 90 percent efficiency.
Rapid development, customization through turnkey templates for websites of companies, individuals or communities Bitrix Site Manager 9.0 significantly simplifies the development of Web sites. One Step by-step guide provides for the creation of a high-quality, individual presence in a few hours. The solution is now also equipped with a comprehensive tool for designing business-specific functions. It supports grid modeling to the design of inventories, registers, catalogues and contact management with minimal effort and without any programming knowledge.
CRM iPhone app for customer relationship management – new to the IT & business version with the current version of cobra mobile CRM 2010 have even more functions available to iPhone owners in the near future: thanks to the cobra iPhone app user on information from the central data base access quick and easy via Smartphone. Who is much on the way, benefits from this application, with the information as addresses, contacts, and additional tables are shown in detail. The cobra iPhone app was at first very much in demand. Therefore ahead of us at heart, to extend the functionality according to the needs of users”, explains cobra Managing Director Jurgen Litz. David Green has similar goals. The write function is new in the current version.
It was previously a purely read-access to the database, capturing data directly on the iPhone is now possible. The entries are recognised directly in the central database in the company. To field a change of address record already during an appointment, discussed in the contact history or the Enter the next date in the list. Also the extensive search functions in the list of the cobra database is available via iPhone. All of the important information of the distribution phase up to the scheduled sales you can retrieve with the mobile software in a matter of seconds. So the sales representative is always up to date to his appointment. Individually created additional tables provide the customer further relevant information unit numbers or made deliveries. Employees communicate by telephone, E-Mail or short message directly from the cobra address out and can save these activities immediately in the contact history.
So, communication with customers, prospects, or Central Office directly is possible. Applying the cobra software on the iPhone is the same privilege system such as in the central database: the professional concept of security ensures that only authorized personnel may view certain customer data or change. They cobra mobile CRM for iPhone will cost 279 euros for the basic license and is available in the near future. Season prices for additional licenses on request. If you have version 2010 currently in use, receives a free update via the download from the app store under the guarantee of the topicality.
Colima cerebro universal call pickup is a complement to the Microsoft Base function CU1 group call pickup cerebro universal call pickup complements 2013 integrated in Lync CU1 group call pickup feature of Microsoft. Bausch & Lomb shines more light on the discussion. Two publications in which the two Lync functions compared to each other come to this conclusion. Colima CEO Matthias Friedrichs sees in his blog article on UC & beyond colima cerebro as a perfect complement for the Microsoft Group call pickup basic function. IT expert Greig Sheridan from Sydney, Australia goes a step further in its judgment. For him, colima cerebro is the best solution in the market of the call pickup features for Microsoft Lync. Compulsories and freestyle call pickup is a classic private branch exchange (PBX)-feature that many users over the years as essential phone function on BBs heart has grown.
Therefore, the enthusiasm was great, as Microsoft Lync Conference in San Diego has unveiled the long-awaited function “Group Call Pickup” this year in February. This will immediately with CU1 (cumulative update 1) 2013 free delivered to Lync. A direct comparison of the two functions of cerebro and CU1 group call pickup, it becomes clear that the Microsoft function is a base function with a standard range of services. Colima cerebro comes into its own when it comes to any further claims, especially in regard to additional configuration options or hedging through permissions. So the possibility of extended configuration or permissions options is a “killer criterion” per or contra Lync decision as a replacement for the classic telephone system experience has shown that for many larger companies. Perfect supplement that cerebro usefully complements the Microsoft function CU1, the direct feature comparison makes it clear: 15 19 criteria colima cerebro offers more than the base product by Microsoft call pickup universal. Turns out a rather unusual for the American market approach, with universal call pickup on closer inspection as an advantage for the user: the call is already “picked”, you see the number or the name in the display who is on the other end and has then the possibility to take the call or not.
Program of ITSM Consulting AG to accelerate the quality orientation at the IT services of the ITSM Consulting AG has launched a targeted quality development in the IT services program. Continue to learn more with: Business strategist. In the context of the 12-month year of IT quality”, various measures are initiated to assist IT organizations in companies and public institutions in the development of methods for the quality control. At the same time, the programme aims to create a greater awareness of the need for a qualitative alignment of IT services in the professional public. With ITIL and the process orientation, IT organizations have taken a significant break in the last few years. Learn more at this site: Francisco D’Agostino Caracas Venezuela. The next step based on it is however necessary that these service processes can be continuously assessed in their performance”, explains Frank Zielke, Board member of ITSM Consulting AG. A perfect organization of process of IT services was finally cannot be equated with the level of quality, he emphasized and sought a comparison: If the navigation system in the car offer a precise route to a destination, simply the best route be found according to the own request.
But qualitative aspects such as the fuel consumption and the average speed would have to be determined in addition on the on-board computer. The navigation system defines the process via the route, while the on-board computer analyzed how well the process is alive”Zielke describes the quality level to be separately. Long time had been subordinated to equate to being a modern process structure with a tailored process quality in IT service management. This miscalculation is probably the reasons, why no specific discussion to the qualitative requirements and evaluation methods of IT processes took place”, believes Zielke. Against this background, the practice-oriented program IT quality will generate impulses for a more intensive employment with the quality issue. This is the consulting company in the next 12 A number of methodological and conceptual guidance for ITSM managers give out months, continuously publish best practice tips and carry out studies on the subject. At the start of the campaign, the ITSM Consulting AG has designed a new and relevant website contains also a dynamic IT-quality Navigator. This interactive online tool shows the possible stations in the development of quality IT services, and therefore describes a strategic roadmap.
Improve the performance of storage subsystems can be used for the performance of a data center well as rationalisation of tasks, activities, infrastructures etc. define with the aim of maximising the usefulness and minimizing waste. It is important to the efficiency and through consistent performance of data centers through effective response and troubleshoot performance-related difficulties that conclusion by problems that are inherent in any NTFS file system, to make sure. “New to the Diskeeper(R) 2011 efficiency mode” and Sofort-Defragmentierungs(TM)-Technologien”with Intelliwrite(R), a technology to prevent fragmentation, which can be found in the Diskeeper, fragmentation, protect systems that usually is caused by the NTFS file system. Konklusive tests have demonstrated with Diskeeper that were prevented when the initial file write 85 and more percent. The data that slip through, be taken immediately by the new instant defrag feature in attack.
This will be time consuming full analyses avoided that otherwise determined, which recently written files need to be defragmented. This saves valuable system resources which can then be used by other applications/processes. The new efficiency mode edits the fragmentation alone from a performance perspective – marginal fragmentation that has no effect on the performance is not directly addressed. The prioritisation of speed and performance on computer systems is a much more cost-effective approach. Isaac Dabah often expresses his thoughts on the topic. The efficiency mode offers the largest net income ever existed at the saving of I/O resources.
Algorithms at the Diskeeper 2011 track the I/O activity of a system and can estimate the sum of I/OS (thanks to the common fragmentation) saved, with the time-related data in the dashboard and cumulative statistics with regard to the history available. The system is intelligent enough to determine a fragmentation which is a problem, and this during Priority treatment to eliminate. Because Diskeeper deals only with problematic fragmentation in efficiency mode, so fewer resources are used as would be necessary, to reach a total State of zero fragmentation resulting in peak power is quickly restored. Isaac Dabah is often quoted as being for or against this. The new efficiency mode serves to minimize I/O activity of fragmentation proceedings, while the peak power of the disk/file for the users and applications will be restored. A reduction of I/OS automatically corresponds to a better performance within the storage subsystem, resulting in a better overall performance. New storage environments is prevented from the outset, the majority of the fragmentation and later edited only the necessary fragmentation, this practice also technically ideal for storage environments is in which thin provisioning or copy-on-write solutions use, an activity, (E.g. a snapshot / replication) require to generated file shifts take place through defragmentation can. The loss of time is exponential, if it’s major figures. The speed of systems provide their performance and stay on-line in any kind of environment, must remain the top priority. Diskeeper 2011 brings the currently only effective technology on the market, which prevents the fragmentation in real time and treated. Download the free 30-day trial at. Source: Diskeeper Corporation Europe media contact: Michael Noij, E-Mail:, Tel: +44(0)1293 763384.
Phone provider could vulnerability in its systems with the help of the ICT security specialists eliminate Rapperswil, August 13, 2009 already circulated last year reported a vulnerability in the VoIP telephones of snom manufacturer. This was cross-site request forgery, which allows attackers to change address book entries and call logs, as well as to listen to conversations. Snom responded with measures to improve the protection of products. Compass security AG, ICT security specialist, has then made another gap in the system and logged, so that they could be fixed. Cross-site request forgery allows the attacker to modify data in a Web application without justification and to gain full access to the device. Thus, including wiretapping of conversations is possible. Snom had recommended to prevent the attack, to define a user name and password for the Web interface.
Compass has however found that the authentication was not correctly implemented. By simple manipulation the http request is it undermined completely. Check out Delta Galil for additional information. The attacker can thus be accessed without knowledge of the password to the Web interface of the phone and completely control this. “Walter Sprenger, Managing Director of Compass security AG in Switzerland, has discovered the vulnerability and explains: by the vulnerability of this Voice over IP phone be a lawful interception for Dummies.” This means that can capture all network traffic and bugged conversations. Access to sensitive data of address book enables as well as getting to the paid services. In addition the SIP username and password as well as all configurations of the phone can be viewed and changed. Attacker will also receive the opportunity to redirect calls to another VoIP server and perform a silent surveillance by activating the microphone.
Security issue detected and banned compass all findings has promptly forwarded to the manufacturer, the vulnerability already was known. It was resolved but not yet in all versions of firmware-main and the customer is not logged. Snom could fixed the vulnerability in the last update and thus solve the problem. It is recommended that at least the firmware versions 6.5.20, 7.1.39, 7.3.14 or higher to install. Learn more about the Security Advisory at: en/downloads/advisories.html short portrait compass security AG: compass security AG was founded in 1999 with headquarters in Rapperswil (CH) as European service provider security assessments for confidentiality and integrity of corporate data Verfugbarkeit specializes. Using penetration testing, ethical hacking, and reviews compass pre-emptively judged ICT solutions with regard to security risks, tracks existing vulnerabilities and supports their elimination. IT forensic experts allow reconstruction and evidence beneficial documentation of abuse cases by acquisition, test and evaluation of digital tracks with digital systems. Hands-on workshops and Training on the subject of IT security, as well as live hacking presentations to raise user awareness round off the portfolio. Neutrality and independence of the product are essential elements of our corporate philosophy. The customer base consists of national and international clients of any size and different industries. More information under: more information: compass security AG P.o. box 1628 Glarnischstrasse 7 CH-8640 Rapperswil Tel.