Black Box Achieves ISO 14001:2015 Certification
SINGAPORE’S ONGOING BLOCKING OF PIRATE SITES PROTECTS CONSUMERS AND PREVENTS POTENTIALLY WIDER HARM
Cobalt Iron Compass Named a DCIG TOP 5 Enterprise VMware Backup Solution for 2025-26
Cobalt Iron Secures Patent for Cyber Event Analytics and Automated Security Optimizations
Black Box Strengthens Data Center Solutions With Arizona Hyperscale Center of Excellence and Leadership Expansion
NAGRAVISION, Samsung, and DishTV India Revolutionize Subscriber Access to Satellite Content with TVKey Cloud
NAGRAVISION and Airties Partner to Enhance Consumer Cybersecurity for Homes and Small Businesses
France Télévisions Free-To-Air Replay Content Brings French Viewers the Summer of Sport, Secured by NAGRAVISION
NAGRA Streaming Security Solutions Chosen by FanCode to Tackle Sports Piracy and Enhance Experience of 160m+ Sports Fans
Cybalt Prevents Catastrophic Business Disruption for Major Enterprises Worldwide
-
Black Box Expands Platinum Level Zoom Certifications With the Addition of Zoom CX
Black Box®, a Platinum Certified Solution Provider for Zoom Rooms and Zoom Phone, today announced its recent certification to sell and implement Zoom Customer Experience (CX). This high-level partnership further enhances Black Box's ability to bring Zoom's comprehensive communications platform to the market globally, something only a handful of companies can do. These services keep enterprises secure, agile, and customer focused. "The landscape of work is always evolving, and Zoom — with its flexible, feature-rich, software-based solutions — is an ideal addition to the modern workplace solutions that Black Box provides and integrates into contemporary workspaces," said Jim McKenna, Vice President of Strategic Partnerships at Black Box. "Vendors must be certified to sell Zoom CX, just like Zoom Phone and Zoom Rooms, and Black Box is now certified for all. This, coupled with Black Box's renowned integration and support services, means we can offer a seamless experience with Zoom, enhancing overall communication for everyone involved." Zoom's CX solutions provide personalized customer experiences while enhancing agent productivity and operational efficiency. From intuitive self-service, AI-powered interaction channels to seamless integration with various channels and CRM systems, these solutions enable quick issue resolution, 24/7 support and easy escalation to human agents when needed, helping businesses streamline customer service workflows, reduce costs and increase top-line revenue. Zoom's CX solutions not only offer real-time performance tracking, comprehensive reporting and customizable experiences but also empower virtual and human agents with necessary information and tools, including video capabilities for enhanced customer interactions. "Our ability to now offer end-to-end Zoom solutions, from Rooms and Phone to CX, allows us to tailor communication ecosystems that truly transform how businesses connect, both internally and with their customers," said Brian Szep, Director CX Product Management at Black Box. "By expanding our expertise across Zoom's entire platform, we're uniquely positioned to help organizations create seamless, integrated environments that bridge the gap between internal collaboration and customer engagement." "It's been great teaming up with Black Box. As a service-oriented business, Black Box goes beyond simply meeting the critical needs of modern workplaces and workflows by providing enterprises with advanced connectivity solutions," said Mike Conlon, Head of Americas Channels at Zoom. "By becoming a Zoom Platinum Level partner, Black Box can more easily assist workers across the world in incorporating these robust tools thanks to their expanded knowledge and resources." Further information about Black Box and its full product portfolio is available at www.blackbox.com
-
Cobalt Iron Expands Access to Secure Automated Backup With Compass for IBM Power Virtual Server
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that Secure Automated Backup with Compass®, a cloud backup-as-a-service offering powered by the Cobalt Iron Compass SaaS platform, is now available in multiple regions around the world. Developed with IBM, the solution serves enterprises that are running on or moving to an IBM Power Virtual Server. It backs up AIX and Linux operating systems and databases, greatly accelerating the protection of IBM Power systems, applications, and data and reducing the risk of data loss and exposure. The solution was first announced in April with availability in the United States. Due to global demand and data sovereignty requirements, the offering is now available through the IBM Cloud Catalog in the following regions: Dallas; Washington, D.C.; Madrid; Frankfurt, Germany; Sao Paulo; Tokyo; and Osaka, Japan. It will soon be available for IBM Power Virtual Server customers in London and Toronto. By ordering from the IBM Cloud Catalog, IBM Power Virtual Server customers get a simple, secure, and automated backup and restore experience that turns on within minutes of ordering. From there, Secure Automated Backup with Compass automates all operational tasks and complexities, allowing customers to protect their data quickly and securely. Prior to this offering, customers had to manually select, install, configure, optimize, manage, monitor, maintain, and secure all components of a backup infrastructure in order to protect their workloads in Power Virtual Server. With Secure Automated Backup with Compass, IBM Power Virtual Server customers can protect a variety of platforms, applications, and data classes, such as DB2, Oracle, and SAP HANA. That same Compass cloud solution can also protect on-premises Power and other workloads and provide a consolidated, enterprisewide view of data protection and recovery operations. "Many IBM Power customers are migrating their on-prem applications to IBM Power Virtual Server, and they need a simple and robust backup solution to do it. That's why we extended our deep integration and partnership with IBM — to bring enterprise-class data protection and automation to IBM Power Virtual Server workloads. Now IBM users all over the world have easy access to this technology, with more regions coming soon," said Andy Hurt, chief marketing officer at Cobalt Iron.
-
Black Box Recognized as a 2023 Worldwide GSI AIDE Partner of the Year by Juniper Networks
Black Box®, a global leader in delivering innovative communication and technology solutions, today announced that it has been recognized as Worldwide GSI AIDE 2023 Partner of the Year by Juniper Networks, a leader in secure AI-native networks. Each year, Juniper Networks recognizes partners based on their ability to drive innovative AI-native business solutions, providing exceptional customer and user experiences while achieving their financial goals. Black Box was recognized as the 2023 winner in the GSI — Global Solutions Integrator category — for its ability to modernize automated cloud-based network solutions integrating Juniper Networks' AI-native technologies. Juniper's 2023 Partner of the Year Awards are hosted as part of the Juniper Partner Advantage Program. The program not only recognizes partners for their outstanding performance in delivering digital transformation to customers but also helps partners build, sustain and grow their Juniper Practice with the right support and tools to leverage the next generation of networking solutions. "At Juniper Networks, we are thrilled to recognize Black Box as the Worldwide GSI AIDE 2023 Partner of the Year. Their commitment to driving innovative, AI-native business solutions has been exemplary, and their ability to modernize automated cloud-based network solutions integrating our AI-native technologies is truly commendable. This recognition is a testament to their outstanding performance in delivering exceptional customer and user experiences while achieving their financial goals. We look forward to continuing our partnership and supporting Black Box in leveraging the next generation of networking solutions as part of our Juniper Partner Advantage Program," said Gordon Mackintosh, GVP of Partner Organization, Juniper Networks. "Being recognized as the Juniper Worldwide GSI AIDE Partner of the Year for 2023 is a testament to Black Box's unwavering dedication to technological advancement and industry leadership," said Sanjeev Verma, CEO of Black Box. "This accolade underscores our strategic alignment with Juniper Networks, a true trailblazer in AI and networking, and reinforces our commitment and contribution to shaping the future of technology. More than just recognition, it is a powerful affirmation of the value Black Box places on its partnerships." Additionally, Black Box is proud to announce its new designation as a Global Elite Plus Partner in the Juniper Partner Advantage Program. This prestigious status highlights Black Box's exceptional capabilities and commitment to delivering innovative solutions on a global scale. The Global Elite Plus designation further cements Black Box's position as a leader in the industry, enhancing its ability to provide unparalleled service and expertise to clients worldwide.
-
Nuvoton Develops OpenTitan based Security Chip as Next Gen Security Solution for Chromebooks
Nuvoton Technology Corporation, a global leader in embedded controller and secure IC solutions, announced today that Google’s ChromeOS plans to use the first commercial chip built on the OpenTitan® open source secure silicon design as an evolution of its security chip for Chromebooks. This is a result of years of co-development and a close partnership between the companies. The new chip is based on OpenTitan, a commercial-grade open source silicon design that provides a trustworthy, transparent, and secure silicon platform. It will be used by Google to provide the best protection to Chromebook users. OpenTitan ensures that the system boots from a known good state using properly verified code and establishes a hardware root of trust (RoT) for a variety of system-critical cryptographic operations. "Hardware security is something we don't compromise on. We are excited to partner with the dream team of Nuvoton, a valued, historic, strategic partner, and lowRISC, a leader in secure silicon, to maintain this high bar of quality." said Prajakta Gudhadhe, Sr Director, ChromeOS Platform Engineering. "Google is proud of taking an active role in helping build OpenTitan into a first of a kind open source project, and now we're excited to see Nuvoton and lowRISC take the next big step and implement a first-of-its-kind open source chip that will protect users all over the world.” “Nuvoton has been a reliable supplier of embedded controllers (EC) to Chromebooks and Baseboard Management Controllers (BMC) to Google servers in the past decade,” said Erez Naory, VP of Client and Security Products at Nuvoton. “We have now expanded this collaboration with Google and our other OpenTitan partners to bring a new strengthened security IC to Google products and the open market.” With the goal of making a completely transparent and trustworthy secure silicon platform, the open source project has been developed in the past five years by the OpenTitan coalition of companies hosted by lowRISC C.I.C., the open silicon ecosystem organization. The dedication and expertise of OpenTitan’s skilled community of contributors brought this industry-leading technology to life, producing the world’s first open source secure chip with commercial-grade design verification (DV), testing, and continuous integration (CI). “Google's integration of OpenTitan into Chromebooks is a watershed moment — the era of commercial-grade open source silicon has truly arrived,” said Dr. Gavin Ferris, CEO of lowRISC, OpenTitan’s non-profit host organization. “It's a fantastic validation of the Silicon Commons approach adopted by our OpenTitan project partners and proves that collaborative engineering, driven by an unerring focus on quality and transparency, can successfully deliver products meeting the most stringent security requirements.” The OpenTitan secure silicon samples are available to the broader market through an early access program and will be in volume production by 2025.
-
Zoom bolsters security offering with the inclusion of post-quantum end-to-end encryption in Zoom Workplace
Today, Zoom Video Communications, Inc. (NASDAQ: ZM) announced that post-quantum end-to-end encryption (E2EE) is now globally available for Zoom Workplace, specifically Zoom Meetings, with Zoom Phone and Zoom Rooms coming soon. The launch of the new security enhancement makes Zoom the first UCaaS company to offer a post-quantum E2EE solution for video conferencing. As adversarial threats become more sophisticated, so does the need to safeguard user data. In certain circumstances, attackers may have the ability to capture encrypted network traffic now, with the intent to decrypt it later when quantum computers become more advanced — a scenario often referred to as “harvest now, decrypt later”. So, while powerful quantum computers with this capability are not yet generally available, Zoom has taken a proactive stance by upgrading the algorithms designed to be able to withstand these potential future threats. “Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs,” said Michael Adams, chief information security officer at Zoom. "With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected.” - How post-quantum E2E encryption works When users enable E2EE for their meetings, Zoom’s system is designed to provide only the participants with access to the encryption keys that are used to encrypt the meeting; this is the behavior for both post-quantum E2EE and standard E2EE. Because Zoom’s servers do not have the necessary decryption key, encrypted data relayed through Zoom’s servers is indecipherable. In addition, to defend against “harvest now, decrypt later” attacks, Zoom’s post-quantum E2E encryption uses Kyber 768, an algorithm being standardized by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism, or ML-KEM, in FIPS 203. Visit our support article to understand which versions and platforms of Zoom Workplace support using post-quantum E2EE.
-
Cigent and Swissbit announce partnership to enhance endpoint data security
Cigent, a leading provider of endpoint data protection solutions, and Swissbit, a leading manufacturer of storage, security, and embedded IoT solutions, today announced a strategic partnership to offer a comprehensive portfolio of secure storage drives designed to safeguard endpoint data against a growing landscape of cyberthreats. This collaboration addresses the urgent market requirements for improved data security on endpoint devices, where a significant majority of sensitive data resides and is frequently targeted by cyberthreats. In today’s digital age, sensitive data continues to reside on endpoint devices, with a staggering 73 percent containing critical information. These devices remain vulnerable to both remote attacks and physical breaches, with a laptop stolen every 53 seconds on average. Traditional data protection methods are failing to keep pace as 70 percent of data loss incidents originate from compromised endpoints. The rise of AI-powered attacks further necessitates a paradigm shift beyond “detect and respond” strategies, demanding a focus on immutable data protection. Cigent and Swissbit: A powerful combination The new partnership brings together Cigent’s industry-leading endpoint data protection expertise with Swissbit’s proven track record as the leading European manufacturer of storage, security, and embedded IoT solutions for demanding applications. The result will be a portfolio of secure storage drives designed to deliver unparalleled data security that safeguards endpoint data from remote or physical threats even if a device has been compromises. According to Kai Imgenberg, Director Sales Embedded IoT Solutions Americas at Swissbit, “Swissbit and Cigent’s partnership uniquely combines Swissbit’s tamper-resistant hardware with Cigent’s best-in-class encryption software, offering an unmatched level of data security for end-to-end protection. Customers can benefit from a single, unified solution that simplifies secure data storage and access across their entire infrastructure.” Unparalleled protection with minimal disruption Cigent and Swissbit are currently developing secure storage drives that will provide a unique combination of robust protection and user-friendliness. These upcoming solutions are designed to ensure data security without compromising the user experience and will require minimal IT intervention thanks to their innovative “set and forget” capabilities. Key features and benefits include: Zero-trust data access: Enforces policy-driven multi-factor authentication (MFA) for verified, trust-based access control to ensure that files remain shielded from unauthorized access. Hidden drives: Data is rendered unreadable at the sector level until unlocked with MFA, even after a user logs on to the device. Pre-boot authentication (PBA) with Swissbit FIDO token iShield Key Pro: PBA significantly bolsters protection against physical attacks by requiring authentication through a secure Swissbit FIDO token. Verified data erasure: Guarantees that every data block is permanently erased, enabling safe device repurposing and recycling. Provides verifiable confirmation of emergency data deletion. Data erasure can be executed locally or via remote wipe functionality. Availability at RSA Conference 2024 Both Cigent and Swissbit will be showcasing their solutions at the upcoming RSA Conference 2024. Visit Cigent at booth #6279 and Swissbit at booth #5270 to learn more about this groundbreaking partnership and how it empowers organizations to achieve unshakable endpoint data security.
-
Digital identity protection: Swissbit introduces iShield Key Pro with USB-C interface
Swissbit is expanding its portfolio of hardware-based security keys with the new iShield Key Pro featuring a USB-C interface. Like its USB-A counterpart, the new model supports the FIDO2 standard as well as the PIV, HOTP and TOTP security protocols. The iShield Key Pro can also be used for physical access control applications, making it one of the most flexible security keys. In addition to the two Pro variants, Swissbit offers the iShield Key FIDO2, a model that is limited to FIDO2 functionality and therefore ideal for secure logins to websites and services. The iShield Key FIDO2 will also be available with a USB-S or USB-C interface. With the new iShield Key Pro, Swissbit is continuing to expand its authentication offerings. The new USB-C interface gives users even more options to protect their digital identities. The iShield Key Pro minimizes not only the risk of online threats such as phishing, social engineering or account hijacking. It is also suitable for implementing security guidelines such as NIS-2, which requires multifactor authentication (MFA) in connection with IT systems for access control. Functions, compatibility, and configuration The iShield Key Pro features more functions and protocols than a standard FIDO stick. They include PIV (Personal Identity Verification) for document signing and encryption. It is also compatible with older systems and security technologies, including HOTP (HMAC-based One-Time Password) for offline applications and TOTP (Time-based One-Time Password). The iShield Key Pro supports up to 42 TOTP slots. Temporary passwords for NFC-capable Android devices can be generated via an Android TOTP app. To configure TOTP, HOTP, and PIV functionalities, iShield Key Manager software is available free of charge for Windows, macOS, and Linux. Versatile application capabilities As an all-in-one security key, the iShield Key Pro supports USB as well as NFC connectivity, making it suitable for use with mobile phones. The contactless transfer of data also opens up many application capabilities in the access control field. To implement this functionality, Swissbit cooperates with selected technology partners and is available for project inquiries. The iShield Key family In addition to the iShield Key Pro, Swissbit also offers the iShield Key FIDO2. By being limited to the FIDO2/WebAuthn standards and their predecessor U2F, it provides a low-cost entry into the world of phishing-resistant authentication. The iShield Key FIDO2 will also be available in USB-A and USB-C versions. All sticks are manufactured in Swissbit's own semiconductor factory in Berlin and are designed for use in temperatures ranging from -25 °C to 70 °C (-13 °F to 158 °F).
-
Integrated solution provides ultra-low latency, tamper-proof, and just-in-time distribution of live video
In advance of the 2024 NAB Show, NAGRA, a Kudelski Group (SIX:KUD.S) company and the world's leading independent provider of content protection and media and entertainment solutions, and Content Fabric pioneer, Eluvio, today announced the commercial launch of the industry’s first integration of NAGRA NexGuard forensic watermarking for secure, just-in-time, ultra-low latency live streaming via decentralized networking using the Eluvio Content Fabric. The new capability was designed specifically to support broadcasters and producers of live sports and premium live events to deliver ultra high-quality and low-cost live streaming while enforcing viewing rights. The solution enables end-to-end protection against piracy and allows for detecting and stopping piracy per-session at source. Today’s announcement is an extension of the innovative work the two companies jointly unveiled last year for premium on-demand video. With it, Eluvio has now integrated NAGRA NexGuard Streaming for live video, full-length premium video, and short-form clips. The Eluvio Content Fabric is an open and decentralized, streaming, content distribution, and storage network built for the third generation Internet. The Fabric delivers live streams with deterministic end-to-end latencies under three seconds globally to standard streaming clients (DASH/HLS over HTTP) and provides a complete full-featured media stack to publish, store and deliver premium live streaming, PVOD, and FAST Channel streaming at scale, including personalization, access control, content protection and proof of engagement. Companies, artists and brands whose premium content distribution initiatives have been powered by Eluvio include: Amazon Studios/MGM Studios, Dolly Parton, FOX, Microsoft, Paramount Home Entertainment, SONY Pictures, Telstra Broadcast Services, Warner Bros. Home Entertainment, WWE, and others. NAGRA NexGuard Streaming watermarking is applied in the Eluvio Content Fabric as part of an end-to-end trustless content security model and exploits the Fabric’s native, hyper efficient and low latency global streaming pipeline. “This new forensic watermarking capability for live streams completes the Content Fabric’s trustless, verifiable, and tamper-proof content security capabilities that prove, protect, and secure live video from its source to global viewers with ease,” said Michelle Munson, co-founder and CEO of Eluvio. “The Content Fabric protocol ensures live video assets are encrypted with the latest ‘trustless’ cryptography, backed by in-protocol blockchain contracts, and managed by on-chain policy to enforce playout authorization at the source. We’re excited to have brought forensic watermarking to our just-in-time, ultra-low latency live video streaming with NAGRA. The solution is per-session, end-to-end, and scalable.” “The growth of OTT delivery of live sports is creating new piracy threats that require greater security,” said Ken Gerstein, VP Sales, NAGRA Anti-Piracy & NexGuard. “We’re proud to continue our innovative work with Eluvio which allows for the seamless integration of our forensic watermarking solution with the Eluvio Content Fabric to ensure that action can be taken against piracy. Eluvio and NAGRA are committed to minimizing, tracing and stopping content leaks at their source for premium VOD content and now, live sports and premium live events.” Eluvio and NAGRA at NAB 2024 At NAB 2024, Eluvio will host meetings in the Las Vegas Convention Center, West Hall Level 2 meeting room W237. Eluvio’s co-founders will demonstrate the latest Content Fabric release and applications on Sunday, April 14 and Monday, April 15 from 1:00 p.m. - 2:00 p.m. in W237 and will host various tech talks and events throughout NAB, with full details and registration information available at https://live.eluv.io/community. On Saturday, April 13, Eluvio President and co-founder, Serban Simu, will speak at the CDSA Content Protection Summit in LVCC West Hall 108/109. On Sunday, April 14, from 8:00-9:30 a.m., Ms. Munson will speak on the IABM Industry Breakfast Briefing Panel in Ballrooms D&E of the Westgate Hotel. From 11:30 a.m. - 12:00 p.m. on Sunday, Ms. Munson will speak at the Main Stage Theater in the Capitalize Zone of the West Hall on “Content Fabric - Your Next Generation Distribution for Premium Live Streaming, PVOD, FAST Channels, and Video Archive Monetization at Scale.” On Monday, April 15 at 12:15-12:45 p.m. in West Hall #W3943, Ms. Munson will speak on the panel: “Leveraging the Power of Generative AI to Deliver Personalized Content at Scale.” On Tuesday, April 16 from 12:00-1:00 p.m., she will speak at the Women Connect Leadership Summit luncheon executive panel produced by GALSNGEAR and Sports Video Group on “The Future of Story: Tech Trends & Audience Engagement” at NAB West Hall, W208-209. NAGRA NexGuard Forensic Watermarking is a key solution of the NAGRA Active Streaming Protection toolset, designed to deliver the ultimate in streaming security and guard against the threat of service and content piracy.
-
European Patent Office Grants Cobalt Iron a Patent on Its Cyber Event Responsiveness
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has received a European patent on its technology for cyber event responsiveness, officially known as dynamic IT infrastructure optimization responsive to cyber threats. Patent No. 3683705, granted by the European Patent Office on Jan. 17, describes techniques that will improve monitoring, detection, impact analysis, and automated reconfiguration of IT infrastructure and operations when cyber threats arise. These functions, which will be available in the Cobalt Iron Compass® enterprise SaaS backup platform, will provide insights for businesses at the most critical and stressful times — when under attack — and will perform automated remediation procedures to reduce exposure and damage. Cyber-criminal activities continue to increase in number and grow in sophistication. These activities commonly exploit IT infrastructures, most of which are vulnerable because they are statically configured, run outdated software, and are completely unresponsive when conditions change and threats occur. Outsmarting the criminals requires continual improvement in monitoring, detecting, and analyzing cyber threats and automatically remediating the infrastructure to counteract them. Companies need more dynamic means of reconfiguring IT infrastructure in response to external conditions and events, including cyber attacks, so they can arm themselves against cyber threats. Cobalt Iron's newly patented techniques introduce unique cyber threat analytics and automated optimizations that will kick in in response to cyber events. When the techniques are fully implemented into Compass, Compass will be able to: Determine the interdependencies between various hardware devices of the environment and directories, files, databases, and data. Continually monitor metrics, events, and conditions for indications of a cyber attack in the network. Analyze metrics, events, conditions, and configurations to identify hardware devices and data that may be impacted by or vulnerable to a cyber attack. Automatically create an audit report of impacted hardware devices and data. Automatically initiate remediation operations for impacted or vulnerable devices and data. Remediation operations may include things such as: Restricting access to impacted or vulnerable devices and data. Initiating data replication of a previous clean backup version of the data to an off-site location. Initiating recovery and validation of affected data to a safe storage location. As an example, the disclosed techniques will monitor metrics, events, and conditions in the environment. Upon indications of a cyber attack, Compass could perform impact analysis to identify hardware devices and data impacted by the attack, and then it could take remediation actions, such as restricting access to the identified devices and data to limit further damage. "Detecting cyber attacks, determining the scope of impact, and taking proper remediation actions are all critical aspects of a cyber security game plan. This patent introduces cyber event analytics that provide insights into an attack. It also introduces automated remediation operations to limit the impact of an attack and further secure data," said James Kost, senior systems engineer at Cobalt Iron. "Cobalt Iron is focused on protecting and securing business data, so we continue to innovate in the areas of ransomware analytics and automated IT infrastructure optimizations."
-
Swissbit makes its debut at the RSA Conference 2024 showcasing leading-edge FIDO2 solutions
Swissbit, a leading manufacturer of storage, security, and embedded IoT solutions, is thrilled to announce its first participation in the prestigious RSA Conference taking place from May 6 to May 9, 2024, at the Moscone Center in San Francisco. This marks a significant milestone for Swissbit as it introduces its cutting-edge iShield Key product series to the RSA community, emphasizing the importance of robust hardware authentication in today’s digital age. Swissbit’s showcase will be centered around the iShield Key Pro, a cornerstone of the iShield Key series, which was designed to fortify online accounts with unparalleled hardware authentication capabilities. The iShield Key Pro distinguishes itself as more than just another FIDO security stick by supporting a wide array of security standards, including FIDO2, HOTP, TOTP, and PIV. Its unique capability to double as a physical access control tool sets it apart in the market, especially with the impending adoption of FIPS 140-3 standards, ensuring the highest level of cryptographic security. New iShield Key Pro with USB-C Interface In concert with the RSA Conference, Swissbit is excited to unveil the latest addition to its hardware token portfolio: the new iShield Key Pro with a USB-C interface. It maintains the versatility and robust security features of its predecessors while offering the modern convenience of USB-C connectivity. The iShield Key FIDO2, another variant in the lineup, is limited to the FIDO2/WebAuthn and U2F predecessor standard, making it a cost-efficient entry into the world of secure logins to websites and services. The iShield Key FIDO2 will also be available with USB-C and USB-A interfaces in the future. According to Kai Imgenberg, Director Sales, Embedded IoT Solutions Americas at Swissbit, “Swissbit is at the forefront of a digital transformation where securing digital identities and transactions has never been more critical. Our presence at the RSA Conference signifies Swissbit’s commitment to FIDO2-based authentication solutions in North America. By empowering our customers to seamlessly implement zero-trust security principles and phishing-resistant MFA, we are not just participating in the industry’s evolution – we are leading it. We are confident that this event will be a catalyst for Swissbit in setting new benchmarks and delivering pioneering solutions to our customers. Swissbit will lead the Fido market by being the first to introduce FIPS 140-3 and as well as the only FIDO2 security dongle for logical and physical access control to the market.” Leading the charge in FIDO2 authentication for North America Swissbit’s vision to become the premier provider of FIDO2 solutions in North America is well in line with the growing demand for secure, flexible authentication methods that can keep pace with rapid advancements in technology and cyber threats. By introducing innovative products like the iShield Key Pro, Swissbit is set to make significant strides in enabling businesses to adopt stronger, phishing-resistant authentication mechanisms, thereby enhancing the overall security posture of organizations across the continent. Swissbit invites attendees of the RSA Conference to visit Booth 5270 to explore the future of hardware authentication and discuss how Swissbit can support the implementation of robust security frameworks within their operations.
-
Swissbit at GPEC 2024: Secure data retention for police agencies and government authorities
For the first time, storage and security specialist Swissbit will be represented at the General Police Equipment Exhibition & Conference (GPEC) to be held from May 6 to 8, 2024 in Leipzig, Germany. GPEC is the largest closed-to-the-public special event for police and other security agencies in Europe. Swissbit will present its innovative iShield Archive solution in Hall 2 at Booth J41. The microSD card was developed especially for the secure retention of video and image recordings, making it ideal for use by police agencies, government authorities, and other organizations where the confidentiality of sensitive data and privacy protection as per GDPR have top priority. Several state police agencies in Germany are already using iShield Archive cards in drones. The secure storage of evidence plays a central role in police operations. With iShield Archive, police agencies can ensure that video and image recordings of crime scenes, deployments or observations remain confidential and safe from unauthorized access at all times. The microSD card encrypts all data on the hardware side with the proven AES 256-bit standard for the highest level of security. Since it is compatible with all popular camera types, it can be easily integrated into existing systems. With iShield Archive, authorities can add another layer of security to drones, body cams and numerous other types of cameras. Plug-and-play for easy operation Setting up iShield Archive is easy. With the free iShield Archive Tool (iAT), administrators can configure the security settings and assign user PINs. Once set up, the iShield Archive card records the data on its hardware reliably and encrypted with AES 256-bit. Access protection via user PIN and WORM mode After the camera has been turned off or the microSD card removed from it, the data recorded on iShield Archive is no longer visible. It can be read, downloaded or deleted only with the iAT software and the correct user PIN. Optionally, the data can also be protected from deletion with an admin PIN, which is why the iShield Archive can also be used in environments with role-based access controls. In the so-called WORM (write once, read many) mode, regular users have only read access via their user PIN and are therefore unable to change or delete data. This method is particularly suitable for storing evidence or other sensitive data that must be archived in a manner that is legally secure and cannot be altered. Field-tested: Agencies rely on iShield Archive The increasing importance of data security and privacy in police work is also reflected in the acceptance of iShield Archive. Several German state police agencies are already using the microSD card to protect sensitive data in their drones.
-
WiTTRA Secures ISO 27001 Certification: A Milestone Achievement in Information Security
WiTTRA, a leading innovator in the Internet of Things (IoT) solutions, proudly announces its achievement of the ISO 27001 certification, underscoring its commitment to the highest standards of information security. This prestigious certification is a testament to WiTTRA's dedication to safeguarding its digital and physical information assets, further solidifying its position as a trusted partner in the IoT industry. ISO 27001 is an internationally recognized standard that outlines the requirements for an information security management system (ISMS). It is designed to help organizations manage the security of assets such as financial information, intellectual property, employee details, and information entrusted to them by third parties. By achieving ISO 27001 certification, WiTTRA has demonstrated its ability to identify risks to information security and implement comprehensive and effective controls to mitigate these risks. "The ISO 27001 certification is not just a badge of honour; it's a fundamental part of our commitment to our clients and partners. It assures them that we prioritize the security of their information with the utmost seriousness," said Håkan Dackefjord, CEO of WiTTRA. "In today's digital age, where data breaches are increasingly common, this certification is critical to building and maintaining trust." WiTTRA's journey to ISO 27001 certification involved a rigorous evaluation process, including a comprehensive review of its information security management practices, policies, and procedures. This achievement highlights WiTTRA's proactive approach to information security, continuous improvement, and dedication to protecting client data against emerging threats. Clients and partners of WiTTRA can now enjoy even greater confidence in the security measures protecting their information. The ISO 27001 certification reinforces WiTTRA's reputation as a leader in the IoT sector, committed to excellence and innovation in information security. For more information about WiTTRA please visit: www.wittra.io
-
Cobalt Iron Announces New Cloud Backup-as-a-Service Offering for IBM Power Virtual Server
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced the availability of Secure Automated Backup™ with Compass®, a new cloud backup-as-a-service offering powered by the Cobalt Iron Compass SaaS platform. Developed with IBM, the solution serves enterprises that are running on, or moving to, an IBM Power Virtual Server. The offering backs up AIX and Linux operating systems and databases, greatly accelerating the protection of IBM Power systems, applications, and data, and reduces the risk of data loss and exposure. Available today, IBM customers can order the service through the IBM Cloud Catalog. "IBM Power Virtual Server clients have voiced a significant need for automated, secure, and easy to use business continuity solutions. Secure Automated Backup with Compass meets this demand by supporting our clients' cloud expansion journey, providing nearly effortless backup solutions for their DB2, Oracle, and SAP workloads running on AIX and Linux operating systems," said Ming Christensen, director of product management (Power and SAP) at IBM. Many IBM Power customers are migrating their on-premises applications to IBM Power Virtual Server to facilitate their operations and they need a simple and robust backup service as part of this migration. To that end, Cobalt Iron partnered with IBM to bring enterprise-class data protection and automation for IBM Power Virtual Server workloads. With Secure Automated Backup with Compass, IBM Power Virtual Server customers can now protect a variety of platforms, applications, and data classes, including but not limited to DB2, Oracle, and SAP HANA. Additionally, customers can easily protect their on-premises Power and other workloads with the same Compass cloud solution and get a consolidated, enterprisewide view of data protection and recovery operations. Secure Automated Backup with Compass is now available in the IBM Cloud Catalog, giving IBM Power Virtual Server customers a simple, secure, and automated backup and restore experience that turns on within minutes of ordering the service. Prior to this offering, customers had to manually select, install, configure, optimize, manage, monitor, maintain, and secure all components of a backup infrastructure in order to protect their workloads in Power Virtual Server. With this proven offering, all of these operational tasks and complexities are automated, allowing customers to protect their data quickly and securely. "Cobalt Iron has extended its deep integration and partnership with IBM with this new Compass offering in the IBM Cloud Catalog," said Andy Hurt, CMO of Cobalt Iron. "This solution combines powerful protection of business-critical Power Virtual Server applications with the simplicity expected of a cloud service — a level of simplicity and security customers do not experience from any other backup solution."
-
NIST CSF 2.0 Governance: SeeMetrics Launches Cybersecurity Governance Boards
SeeMetrics, the pioneering Cybersecurity Performance Management (CPM) platform reshaping how security leaders measure, track, and improve security performance, launches its latest development: Governance Boards. This product feature launch comes in anticipation of the NIST CSF 2.0 framework expansion, which introduces the new Govern function. The new NIST Govern function is aimed at monitoring organizations’ cybersecurity risk management strategy, expectations, and policy. The six categories listed under Govern correlate with SeeMetrics’ approach to Cybersecurity Performance Management (CPM), focused on granting a panoramic oversight to the CISO and CISO’s team. With these boards, which are out-of-the-box (OOTB) collections of ready-to-use metrics, security leaders will manage their policies, processes, and KPIs driven by organizational context and a clear connection between risk and business strategy. The Governance Boards will initially be comprised of three boards needed in order to govern effectively, with each board providing a different point of view on policies: (1) CISO Lay of the Land Board – The primary purpose of this board is to provide security decision-makers with a rapid and intuitive understanding of overall system performance, enabling informed and timely responses to safeguard the organization. It’s a dashboard that shows CISOs the current state of security operations at a glance, backed by a comprehensive analysis of the entire operations. It collects the relevant data and metrics from different boards representing various security programs, offering a visual representation of what really matters. Serving as a snapshot of the organization’s security landscape for the CISO to look at every morning, this board offers a high-level view, tracking and analyzing trends against key performance indicators (KPIs). (2) CISO Policy Enforcement Board – A centralized dashboard designed to oversee and enforce a cohesive set of policies that are currently most important for the CISO to track on a daily basis. This board is an assembly of key metrics from various security domains such as security awareness and endpoint protection. The CISO Policy Enforcement Board plays a crucial role in ensuring that organizational policies are consistently applied, helping to mitigate risks and enhance security posture across the entire enterprise. Coupled with SeeMetrics’ customizations capabilities, each CISO can easily adapt the board on an ongoing basis as their priorities change. (3) NIST Functions Dedicated Board – This board corresponds with all of the NIST functions, providing a systematic approach to cybersecurity management. The board serves as an organized platform where relevant information, processes, and metrics are categorized based on the corresponding NIST function. Each board is designed to streamline and guide activities related to that specific function. The NIST Functions Dedicated Board facilitates a comprehensive and structured implementation of cybersecurity measures. By breaking down the NIST functions into a dedicated board, organizations can effectively govern, as NIST CSF 2.0 suggests. "Introducing the Governance Boards underscores our strong commitment to proactive and strategic cybersecurity governance,” says Shirley Salzman, CEO and Co-Founder of SeeMetrics. “By building these dedicated boards we are providing CISOs with a new kind of automated oversight that previously took too much time and resources to achieve. We are taking on the work of identifying what needs to be measured and the long, tedious process behind it. By automating it we are freeing up the CISO’s time and resources while also giving them a new layer of knowledge.”
-
New Patented Traffic-Shaping Technology From Cobalt Iron Dynamically Adjusts Network Throughput Based on Events
Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has received another new patent, this time on its technology for operational and event-driven network traffic shaping. U.S. Patent 11882094, issued on Jan. 23, describes new capabilities that will be available in Cobalt Iron Compass®, an enterprise SaaS backup platform. The techniques, as disclosed in this patent, use analytics and user-defined policies to automatically optimize network throughput levels to reduce security risks and improve data operations under various, changing conditions. Conditions in today's technology and data environments sometimes change rapidly. These changes can affect the amount of IT resources, such as network bandwidth capacity, that are needed for various operations. However, amidst these changes, IT infrastructure and operations remain relatively static, leading to unoptimized resources and security vulnerabilities. One particular area of static infrastructure is networking. Information networks are typically preallocated resources that don't get adjusted or optimized in response to dynamic conditions in the environment, such as cyber attacks, changing business or operation priorities, or environmental events. These and other conditions could all necessitate network throughput levels that are different from the norm. When it comes to being able to make these dynamic network throughput changes, the industry is lacking. Backup administrators, network administrators, chief information security officers, and other IT professionals need more advanced means of monitoring and dynamically adjusting networks. This patent discloses techniques that, when fully implemented, will make it possible for Compass to dynamically adjust, or shape, network throughput levels for data protection operations based on a range of conditions. Because of the techniques disclosed in this patent, Compass will: Monitor for a plurality of conditions and events that could affect a computer network, including: Cyber attack events Business priority of data being transferred Locality of data Security alert conditions Type of data operation being performed Operational status Weather, power, fire, or environmental events Failing applications, devices, or operations Business events Increase, decrease, or turn off network throughput levels for backup, restore, archive, replication, or other data protection operations responsive to changes in conditions or events. Temporarily adjust network throughput level settings for predetermined time periods. Determine these dynamic adjustments based on a special network traffic shaping policy. Numerous scenarios illustrate the benefits: A cyber attack could trigger an increased level of network throughput capacity from backup repositories to facilitate massive restore operations. That same attack might also warrant decreased throughput of inbound network traffic to company networks to reduce vulnerability. Compass could optimize backup operations by increasing network bandwidth during daily backup windows and automatically decreasing it when a backup operation completes. When severe weather is pending, Compass could activate increased network throughput levels to accommodate the need for special backups. Compass could adjust network throughput levels based on business priority of data being transferred, type of data operation being performed, and other operation-specific characteristics, resulting in more efficient operations. This patent also discloses network traffic-adjusting policies that make it possible for Compass to automatically modify network throughput levels differently over time and for various conditions. As a result, businesses will be able to optimize their enterprise-wide network traffic consistently by policy rather than by manually reconfiguring individual network devices. "Modern data centers are very dynamic environments with looming cyber threats, changing business priorities, critical operations, and complex infrastructure. Information technologies such as networks need to be more responsive to cyber threats as well as changing business conditions," said Rob Marett, chief technology officer at Cobalt Iron. "Cobalt Iron is striving to improve analytics-based optimizations of IT infrastructure. This patent discloses techniques to dynamically shape network throughput levels in response to various security and business conditions. This optimizes operational efficiencies while reducing the risk of security threats."
-
SeeMetrics Launches Cybersecurity Governance Boards
SeeMetrics, the pioneering Cybersecurity Performance Management (CPM) platform reshaping how security leaders measure, track, and improve security performance, launches its latest development: Governance Boards. This product feature launch comes in anticipation of the NIST CSF 2.0 framework expansion, which introduces the new Govern function. The new NIST Govern function is aimed at monitoring organizations’ cybersecurity risk management strategy, expectations, and policy. The six categories listed under Govern correlate with SeeMetrics’ approach to Cybersecurity Performance Management (CPM), focused on granting a panoramic oversight to the CISO and CISO’s team. With these boards, which are out-of-the-box (OOTB) collections of ready-to-use metrics, security leaders will manage their policies, processes, and KPIs driven by organizational context and a clear connection between risk and business strategy. The Governance Boards will initially be comprised of three boards needed in order to govern effectively, with each board providing a different point of view on policies: CISO Lay of the Land Board – The primary purpose of this board is to provide security decision-makers with a rapid and intuitive understanding of overall system performance, enabling informed and timely responses to safeguard the organization. It’s a dashboard that shows CISOs the current state of security operations at a glance, backed by a comprehensive analysis of the entire operations. It collects the relevant data and metrics from different boards representing various security programs, offering a visual representation of what really matters. Serving as a snapshot of the organization’s security landscape for the CISO to look at every morning, this board offers a high-level view, tracking and analyzing trends against key performance indicators (KPIs). CISO Policy Enforcement Board – A centralized dashboard designed to oversee and enforce a cohesive set of policies that are currently most important for the CISO to track on a daily basis. This board is an assembly of key metrics from various security domains such as security awareness and endpoint protection. The CISO Policy Enforcement Board plays a crucial role in ensuring that organizational policies are consistently applied, helping to mitigate risks and enhance security posture across the entire enterprise. Coupled with SeeMetrics’ customizations capabilities, each CISO can easily adapt the board on an ongoing basis as their priorities change. NIST Functions Dedicated Board – This board corresponds with all of the NIST functions, providing a systematic approach to cybersecurity management. The board serves as an organized platform where relevant information, processes, and metrics are categorized based on the corresponding NIST function. Each board is designed to streamline and guide activities related to that specific function. The NIST Functions Dedicated Board facilitates a comprehensive and structured implementation of cybersecurity measures. By breaking down the NIST functions into a dedicated board, organizations can effectively govern, as NIST CSF 2.0 suggests. "Introducing the Governance Boards underscores our strong commitment to proactive and strategic cybersecurity governance,” says Shirley Salzman, CEO and Co-Founder of SeeMetrics. “By building these dedicated boards we are providing CISOs with a new kind of automated oversight that previously took too much time and resources to achieve. We are taking on the work of identifying what needs to be measured and the long, tedious process behind it. By automating it we are freeing up the CISO’s time and resources while also giving them a new layer of knowledge.”
-
Black Box to Showcase Cutting-Edge Connectivity Solutions at BICSI Winter Conference & Exhibition, Jan. 28-Feb. 1
Black Box®, a renowned innovator in delivering communication and technology solutions, will showcase seamless connectivity solutions in Booth 920 at the BICSI Winter Conference & Exhibition, Jan. 28-Feb. 1, at the Rosen Shingle Creek Hotel in Orlando, Florida. The company will spotlight its comprehensive solution offering including wireless technology, Wi-Fi, private 5G/LTE, DAS, AV and intelligent building systems. The BICSI conference will focus on forward-thinking, solution-generating, progressive information and communications technology (ICT) topics. On the second day of the event, David Richards, a longtime BICSI Certified Trainer and Master Instructor who serves as quality and training manager for global solutions integration at Black Box, will be inducted as BICSI President. Richards oversees BICSI and Black Box training and development (T&D) programs in a state-of-the-art Black Box Authorized Training Facility in the Phoenix metro area. "I'm honored and excited to be serving the ICT industry as the next BICSI President," said Richards. "With my experience, I look forward to helping my team advance, mentor and train ICT professionals." Matt Barnes, director of quality for the global deployment services at Black Box, will be a speaker for the "What's New, What's It Do?" session later that evening. "The BICSI Winter Conference & Exhibition draws experts from across the ICT industry to share knowledge, exchange ideas and showcase the latest technologies and solutions," said Barnes, who has a wealth of industry experience including field ICT work. "We look forward to highlighting the robust portfolio of connectivity solutions and services offered by Black Box, as well as the world-class quality program we've implemented to ensure consistent delivery of great results for our customers." Conference attendees who stop by the Black Box Booth 920 can speak with experts about how to plan, select and implement connectivity solutions that best support and enhance their business. They can also register to win a YETI cooler. More information is available here. https://www.blackbox.com/campaigns/bicsi-winter-conference-exhibition