Category Archives: Security

Web & Mobile Accelerator program seeks startups that can make use of AI, blockchain technology and sensors

rockstart_europawire_epr_software_news

Amsterdam, NL, 05-Dec-2016 — /EPR Software News/ — Rockstart, the world’s greatest startup machine, announces applications are open for the 6th Web & Mobile Accelerator program. The program begins on March 1, 2017 and lasts for 150 days. Rockstart supports entrepreneurs with a strong purpose by connecting them with the brightest minds in the industry, including experienced mentors, successful founders, and investors.

Program Director Rutger van Waveren remarks, “When considering founders for the Accelerator, we look for a great team with a well built product that focuses on a problem worth solving. In particular, this year we’re looking for startups who are working to solve big problems under the banner of technology that lets us live meaningful lives: sharing economy, new financial services, productivity tools, making education better, and tools that make software development more efficient and accessible. We’re also interested in ideas to enable the company of the future such as tools that make companies more effective and efficient, creating better logistics systems, 3D printing and computer security. Teams should be able to make use of the latest technologies such as AI, blockchain technology and sensors.”

WEB & MOBILE ALUMNI
Rockstart Web & Mobile startups like 3D Hubs, Peerby, Wercker, Deskbookers and many more have created successful businesses across a variety of B2C and B2B categories. 2016 graduates include Otly!, a bank for kids and their parents and winner of the UberPitch award, which led to funding by Uber. TIQ, a time-tracking solution for the enterprise, won the Exact Software Emerging App of the Year award and was mentioned by the Financieele Dagblad and Lawyer magazine as one of the best startups in the area of legal tech. Surance helps people get more out of their savings by making professional asset management easy and accessible for everybody. Two leading financial institutions have chosen Surance as their exclusive provider for robo-advice technology. To learn more about all the alumni of the Web & Mobile program, please check our website.

HOW TO APPLY
Rockstart’s 2017 Web & Mobile Accelerator will be accepting applications until January 15, 2017 and the program begins March 1, 2017 in the center of Amsterdam. For more information, please take a look at our stats.

Apply now!

SOURCE: EuropaWire

Startup mentored by Promwad created one of the best IoT products in Europe

Vilnius, Lithuania, 2016-Oct-18 — /EPR Software News/ — ZIVE smart radiation monitor has reached the final of Elektra Awards 2016, a big influential contest for the electronics market players. This device designed by R-NOX startup with the assistance of Promwad Electronics Design House was named one of six best innovative products of Europe exploiting the Internet of Things potentialities.

ZIVE is a portable radiation monitor of the next generation that can connect to smartphones and tablets via Bluetooth. It’s the first device of professional level designed for common people. It has a user-friendly interface, a Geiger-Muller counter, and a low market price comparing with other high-precision radiation monitors.

promwad-mobile_zive

ZIVE radiation monitor measures gamma rays, ionizing radiation, and X-rays. Differentiating features of the device:

  • Calibrated by accredited European laboratories (CE).
  • High accuracy at a lower price in comparison with other similar devices.
  • “Smart monitor” mode that provides users with specific health and well-being advice: how to interpret the measurements and reduce the risks.
  • Working with maps to create eco-routes: save radiation spots, find cleaner routes.

The collected ZIVE data is used for the real-time global map of radiation contamination.

Roman Pakholkov, Promwad’s CEO and R-NOX’s mentor, says that the data collected by ZIVE users is stored in the eco-platform, which is becoming the most detailed in the world. This platform allows accelerating the innovations development for the environmental management and can be integrated into other devices and applications via the open API.

To date, R-NOX has developed partnerships with the largest tour operator in the Chernobyl Nuclear Power Plant Zone of Alienation; Greenpeace; companies and organizations in Japan, Finland, Singapore, and other countries.

Promwad continues its work in supporting new electronics design projects in the IoT field. The company believes in the high potential of this popular trend and are ready to share their experience in the development and manufacture of electronic products for the global consumer electronics market.

The best companies of Elektra Awards 2016 will be announced on Thursday, 1st December, at the awards ceremony taking place in The Ballroom, Grosvenor House Hotel, London.

Contact-Details:
promwad-logo
Promwad
Olga Potonya
olga.potonya@promwad.com
+370 (5) 214 12 44 ex.227

Via EPR Network
More Software press releases

Nexus Repository the only repository manager with free support for Java, npm, Bower, NuGet, Docker, PyPI, RubyGems

sonatype-announces-nexus-repository-pro

Fulton, MD, 19-Sep-2016 — /EuropaWire/ — Sonatype, the leader in software supply chain automation, today introduced the latest version of Nexus Repository Pro. The 3.2 version of Nexus Repository Pro will include built-in support for active-active high availability configurations and enhanced security and license analysis for open source components. Sonatype has also expanded Nexus Repository’s free, universal component support to include PyPI and RubyGems.

The new features of Nexus Repository Pro will be demonstrated at Jenkins World (Sept 14 – 15) and JavaOne (Sept 18 – 22). The product is currently being tested in private beta and will be commercially available in Q4 2016.

With over 100,000 active installations, Sonatype’s Nexus Repository Pro now offers expanded capabilities including:

  • High-availability which is uniquely affordable, rapidly configured, and easily managed
  • Universal support for all popular component formats
  • Precise component intelligence for repositories and applications

“We are excited to offer high-availability with the latest version of our Nexus Repository Pro to ensure that companies can achieve their continuous delivery goals,” said Wayne Jackson, CEO, Sonatype. “Our customers will be able to seamlessly integrate high-availability into their existing production environments with this sophisticated, yet cost-effective offering that minimizes downtime and improves reliability. When coupled with our precise component intelligence and ever-expanding component support, Nexus Repository Pro makes building and releasing the best software easy.”

Meeting continuous delivery needs through high availability
Active-active high availability is a requirement for organizations seeking 99.999% up-time across their Continuous Delivery and DevOps toolchains. The latest version of Nexus Repository Pro supports the active-active high availability ensuring that if one server goes down, the other will continue running without interruption. The high availability feature is built into Nexus Repository Pro 3.2 and is remarkably easy to configure. Pricing starts at $1200 per year.

Expanding component support to PyPI and RubyGems
Nexus Repository is the only repository manager to offer free support for the world’s most popular component-based development languages including Java, npm, Bower, NuGet, and Docker, and now PyPI and RubyGems.

Providing precise component intelligence
Everyday, Nexus Repository customers evaluate the quality and security of millions of open source and third-party components across 70,000 repositories using Repository Health Check (RHC). RHC provides intelligence about the components, including license types, known security vulnerabilities, and other data such as relative usage popularity and age. This feature of Nexus Repository 2.x is now being made freely available to Nexus Repository 3.2 users.

Sonatype has now integrated the ability to perform a detailed analysis of the components and applications in Nexus Repository. Application Health Check (AHC) will enable Nexus Repository users to quickly evaluate components used in the applications. According to the 2016 State of the Software Supply Chain Report, 1 in 15 components used in applications includes a known security vulnerability. More advanced policy-based analysis of applications is available from Sonatype’s Nexus Lifecycle and Nexus Auditor solutions.

Upgrading Nexus Repository 2.x to 3.x
Starting with the release of Nexus Repository 3.1, Sonatype has included a seamless upgrade path for customers who are currently using Nexus Repository 2.14. Built-in upgrade tooling and documentation provide the current installed base an easy way to upgrade to take advantage of the latest features, including support for private Docker registries, high-availability, repository health check and universal component support.

SOURCE: EuropaWire

Sesame Smart Lock Accommodates New Technology

Palo Alto, CA, April 21, 2015 — /EPR SOFTWARE NEWS/ — Sesame – the world’s first instant smart lock – is now one of the hottest projects on Kickstarter, which has raised more than one million dollars since launch. Currently, more than 6,000 supporters have backed the project.

Sesame allows users to lock and unlock their doors using the Sesame app on their smartphones. It is the only smart lock that syncs the movement of the lock with the phone, providing exact control of the angle to which the lock turns.

Jerming Gu, the inventor of Sesame, said he wanted to bring the joy of technology to regular people with affordable prices. Sesame is also designed to accommodate the fast changing nature of technology.

In deed, the consumer electronics technology changes year by year. Any users of consumer electronic products – whether it’s a lock or a phone – they will be forced to upgrade the hardware often.

Here are some examples:
1) iPhone 4 (Bluetooth 3.0) is not compatible with iPhone 4S (Bluetooth 4.0);
2) RFID (clipper bus card) is not compatible with NFC (Apple Pay/some credit card);
3) z-wave (most old digital locks) is not compatible with Zigbee (newer digital locks);

“You might want to have a new phone every year but you may not want to construct the door every year just for a newer digital lock,” said Gu.

That’s the problem Sesame is trying to solve.

Now Bluetooth 4.2 is coming, Gu just swapped to the new version 3 Bluetooth chip in mass production.

“Also, the long-distance wireless charging technology is about to hit the market, I feel everything is changing too fast,” said Gu.

With five-patented design, Sesame works with just about any deadbolt in the world. Users can install it in seconds, without replacing existing lock or removing anything. Current model is optimized for US/Canada/northern Europe Markets.

CANDY HOUSE also offers optional access point, which connects Sesame to the Internet when plugged into any nearby outlet. It lets users control Sesame wherever they are.

With Internet connection capability, users can allow guests in remotely. They can also control who has access and when. To ensure safety, the Sesame app also sends out a notification whenever the door opens or closes.

About CANDY HOUSE
Founded and developed by Stanford University students, CANDY HOUSE, Inc. is a candy store that sells dreams, putting the joy and surprise of innovative technology in the hands of consumers, just like candy. It is also a design house, developing and manufacturing products that inspire a minimal lifestyle. It launched its first product – Sesame, the world’s first instant smart lock – in February 2015. For more information about CANDY HOUSE, Inc., visit the site online or follow it on Facebook or Twitter.

Contact CANDY HOUSE
media@candyhouse.co
(650) 644-5681

Via EPR Network
More Software press releases

Stanford Student Entrepreneur Raised $800K on Kickstarter

Palo Alto, CA, April 02, 2015 — /EPR SOFTWARE NEWS/ — Stanford student Jerming Gu, founder of CANDY HOUSE Inc., raised more than $800,000 dollars after his product launch on Kickstarter. Sesame – the world’s first instant smart lock – reached its funding goal in nine hours when first introduced. Currently, nearly 5,000 supporters have backed the project.

Sesame allows users to lock and unlock their doors using the Sesame app on their smartphones. It is the only smart lock that syncs the movement of the lock with the phone, providing exact control of the angle to which the lock turns.

Gu is a mechanical engineering master candidate from Stanford University. Originally from Taiwan, Gu is someone who usually thinks outside the box. Disruptor, troublemaker, entrepreneur, as he calls himself.

“There has got to be smarter ways to live our life,” Gu said.

Gu said he got the idea for smart lock due to his experience living in Asia where technology is relatively less developed.

With five-patented design, Sesame works with just about any deadbolt in the world. Users can install it in seconds, without replacing existing lock or removing anything. Current model is optimized for US/Canada/northern Europe Markets.

CANDY HOUSE also offers optional access point, which connects Sesame to the Internet when plugged into any nearby outlet. It lets users control Sesame wherever they are.

With Internet connection capability, users can allow guests in remotely. They can also control who has access and when. To ensure safety, the Sesame app also sends out a notification whenever the door opens or closes.

About CANDY HOUSE
Founded and developed by Stanford University students, CANDY HOUSE, Inc. is a candy store that sells dreams, putting the joy and surprise of innovative technology in the hands of consumers, just like candy. It is also a design house, developing and manufacturing products that inspire a minimal lifestyle. It launched its first product – Sesame, the world’s first instant smart lock – in February 2015. For more information about CANDY HOUSE, Inc., visit the site online or follow it on Facebook or Twitter.

Contact CANDY HOUSE
media@candyhouse.co
(650) 644-5681

Via EPR Network
More Software press releases

Sesame – smart lock that changes the world

Palo Alto, CA, March 27, 2015 — /EPR SOFTWARE NEWS/ — Sesame, the world’s first instant smart lock, raised more than seven times of its funding goal on Kickstarter. Launched on Kickstarter on Feb. 25, 2015, Sesame has raised more than $760,000 from backers all over the world.

The smart lock, which allows users to control their door with a smartphone app, attracted thousands.

Connected to users’ phone via Bluetooth, Sesame allows users full control of the lock, even to the exact angle a lock turns. With the optional Wi-Fi Access Point that connects Sesame to the Internet, users don’t even have to be physically near Sesame. The remote control feature allows people to send access to their friends and keep track of whether the door’s locked wherever they are.

With five-patented design, Sesame works with just about any deadbolt in the world. Users can install it in seconds, without replacing existing lock or removing anything. Current model is optimized for US/Canada/Singapore/Norway/Sweden Markets.

With market of Internet of Things (IoT) expanding rapidly, backers are turning more and more attention to smart gadgets that make their life easier. Founded by two students from Stanford University, CANDY HOUSE Inc. designs and manufactures products that inspire a minimal yet joyful lifestyle.

“People will carry less and less things when leave the house, that’s the trend,” said Jerming Gu, founder of Candy House.

Wallet, keys, and cell phone. People used to bring three things when they leave home. Now walltet is gradually replaced by keys. The Starbucks app pays your green tea frappuccino, you Venmo money to a friend for getting late-night pizza, you hop on a Uber without worrying about cab fare or tip.

“With Sesame, the next thing to disappear are the keys,” said Gu.

Contact-Details: CANDY HOUSE Inc.
media@candyhouse.co

Via EPR Network
More Software press releases

Hermetic Systems releases a program for secure end-to-end email encryption

Despite substantiated reports that at least one major US telephone service provider gave the National Security Agency full access to its customers’ phone calls, and shunted its customers’ internet traffic to data-mining equipment installed in a secret room in its San Francisco switching center, most Americans still transmit their email in plaintext, allowing it to be scanned by data-sniffers. (The NSA was ordered by a court to stop, but who knows if they complied?) This may be because most Americans don’t give much thought to the possibility that their email could be the subject of eavesdropping, or it could be because for some reason it doesn’t worry them, or it could be because encrypting email has in the past been a somewhat tricky practice to get right (so was deemed not worth the effort).

There are several reasons why email encryption can be difficult, or insecure: Some systems are quite secure but require an elaborate procedure before email can be sent to (and read by) another person. Messages scanned in transit can in the case of some systems reveal that encrypted information is present, thus alerting an eavesdropper to something to look for. Some systems encrypt a message only after it is uploaded to a server, with the message (in plaintext) being vulnerable to interception between the user’s PC and the server.

Hermetic Systems has release software for email encryption which involves none of these difficulties. But why would you want to use it? For correspondence with your family you probably don’t need to. But, for example, suppose you are collaborating with others in a project which requires an exchange of confidential information, which competitors might like to get their hands on. You might be wanting to transmit Excel files containing sensitive financial data, or images with blueprints for a new design.

The new software, entitled ‘Email Encryption End-to-End’, uses an encryption method in which the key used for encryption is the same as the key used for decryption, so your correspondent(s) must know the key you used to encrypt a message. This can be transmitted more-or-less securely, especially if you can meet your correspondent(s) in person. Assuming this can be accomplished, the actual sending and receiving of encrypted messages is quite simple. You run the program (on your PC), compose a message of up to 60 KB in size (or upload it to the program from a file) and specify an encryption key, then hit the ‘Encrypt’ button. This creates a ciphertext file (which you can name as anything you want), and to send it to a correspondent you simply attach it to an ordinary email message. The ciphertext can masquerade as an image file or as a file using some obscure file format, so there’s no indication that encryption is being used.

You correspondent receives the ordinary email, saves the attached (ciphertext) file, runs the software, tells it where to find the file, specifies the encryption (now decryption) key, and hits the ‘Decrypt’ button, whereupon the message appears.

Moreover, ‘Email Encryption End-to-End’ allows you to send, in addition to a text message, a file of any type and up to 1 MB in size. The text message and the file are then combined and encrypted together to produce the ciphertext file. This allows you to send an MS Word file, an Excel file, an image file, etc., in addition to the text message.

The program has an introductory price of US$29.75. A multi-user license is also available (at a discount) for up to 10 users. Such a license is useful for a group of colleagues working together on a single project. A multi-user license requires only a single email address, that of the purchaser of the license, and the email addresses of the purchaser’s email correspondent(s) are not needed.

A trial version can be freely downloaded from the user manual page athttp://www.hermetic.ch/eee/eee.htm. This is a 14-day trial with which only one key (‘abcd efgh ijkl mnop’) can be used for encryption, so it allows testing but (since the key is public knowledge) cannot be used for secure email encryption.

Via EPR Network
More Software press releases

SportsMark selects WinMagic Encryption technology to protect critical data at London 2012 Olympic Games

WinMagic Inc., the global innovator in disk encryption, today announced SportsMark has chosen WinMagic’s SecureDoc data security and encryption software to protect sensitive corporate hospitality program data for the London 2012 Olympic Games.

Of the many events SportsMark will be involved in this year, including Super Bowl, The Masters, and the America’s Cup World Series, the London 2012 Olympic Games will be a pinnacle event. SportsMark has been preparing for this momentous event for over four years, working side by side with its clients to create unparalleled guest experiences and optimize their brand building and sales objectives. SportsMark’s clients will host more than 45,000 guests throughout the Olympic and Paralympic Games, working with a staff of over 1,000 and managing tens of thousands of Olympic event tickets on behalf of their 15 clients.

“We’ve been working with SportsMark for quite some time and we’re very pleased that they selected SecureDoc as their data encryption solution to protect the personal information of all the guests they’ll be hosting during the London 2012 Olympic Games,” said Mark Hickman, worldwide vice-president of sales at WinMagic Inc. “As an existing customer, SportsMark recognized the ease of use and flexibility of SecureDoc and we were more than happy to help ensure this continued for a project of this importance and profile.”

SportsMark’s information services team determined that they required a rapid OS and encryption deployment ready for a highly mobile and diverse workforce to securing log in onto any of their laptops at any of the locations.

“WinMagic SecureDoc was clearly the answer to our requirements,” said Scott Shuemake, systems engineer at SportsMark. “We needed an encryption solution that we could quickly and easily implement, manage centrally and provide all temporary staff with access to all the devices, so we had the flexibility to move staff around the hospitality venues across London, sometimes at short notice.”

SportsMark Group has contracted 1000 temporary hospitality event staff to work for the duration of Olympic and Paralympic Games in more than 15 pop-up offices around central London. These staff will be supplied with rented laptops that require the hard drive to be fully encrypted.

The technical solution consisted of 300 temporary licenses of WinMagic SecureDoc and SecureDoc Enterprise Server to install the SecureDoc packages and provide recovery. SportsMark also utilized WinMagic consultancy services to ensure the smoothest and quickest deployment in the fastest possible timeframe. At the end of the project, SportsMark will take advantage of SecureDoc’s Crypto erase feature to decommission the devices used for the event.

Via EPR Network
More Software press releases

TrustTone Communications Appliances – BEST BUY for Email Encryption

TrustTone Communications, Inc., the leader in Email Encryption technology, today announced it has been rated Best Buy by SC Magazine. The Best Buy designation reflects the coveted Five Star rating for every aspect of the product – Features, Ease of Use, Performance, Documentation, Support and Value for Money. TrustTone continues to provide the most comprehensive feature set at the lowest cost.

“Simple, effective, secure. This is just what this doctor ordered.” notes SC Magazine.

“TrustTone is the perfect solution for email privacy compliance for organization large and small. The product offers depth of functionality and configuration flexibility with very low total cost of ownership,” said Hemant Thakkar, CEO of TrustTone Communications. “We are thrilled to earn the Best Buy designation by SC Magazinne. It validates our approach to creating value for our customers.”

About TrustTone Communications, Inc.
TrustTone Communications is a premier provider of highly secure, easy to use, email encryption appliances, email encryption servers, email encryption desktop products and hosted service for email encryption. The products are based on the foundation technology of Identity Based Encryption on PKI. TrustTone is privately-owned and headquartered in Silicon Valley, California.

Via EPR Network
More Software press releases

Made4Biz Security Inc announced today a trade-in plan for RSA’s SecureID

Each SecureID customer can switch their SecureID devices to IDentiWall while using their SecureID’s past investments as credit against the IDentiWall license fee.

Such trade-in is guaranteed to be financially compelling and technically superior.

The innovative trade-in plan makes sure that switching customers enjoy:

  • Better, newest security technology that protects its users against all latest attacks even if their computer is contaminated with malwares or even if their ID is exposed.
  • Wider security coverage, which includes not only two-factor authentication, but also combines transaction verification, anti-phishing, anti-farming, as well as breach attempt notification.
  • All platform coverage including Desktops, Tablets, Smartphone
  • VPN and SSL-VPN user authentication
  • E-Banking, m-Banking, e-Health, e-Government web application protection with special ‘application agnostic’ mode by which, not even one line of code needs to be changed.
  • Polite implementation including co-existence with SecureID for the transition period and built-in implementation risk elimination measures.
  • No physical devices to be distributed and yet out-of-the-box support for such token devices and smart-cards does exist.
  • Lowest TCO. This trade-in plan was designed to ensure cost savings for the whole duration of the IDentiWall usage.
  • Cloud or on-site implementation options are supported.

Via EPR Network
More Software press releases

USB Lock RP v5.29 – Portable Storage Media Management Software Solution

US Diversified Tech, LLC together with Advanced Systems International, SAC announce the release of USB Lock RP v5.29. A software security solution designed strictly to provide the ability to block or allow specific portable media devices. USB Lock RP’s scope of protection now includes: eSata, Firewire, USB 3.0 super speed technology, MTP, USB 2 sticks, as well as cell phones, Tablets, iPod’s, mp3, SD Cards and all other interfaces that can be used to extract data. The newest and biggest addition is the eSata protection which has been, and remains industry wide, a difficult opening in data security to address. With the inclusion of eSata, USB-3.0 and Firewire super speed transfer interfaces, Advanced Systems International, SAC has addressed every opening presented where a media storage device can be misused. It is important to not just lock out these devices but to have the option to allow their use, when necessary, in a managed and protected manner.

Javier Arrospide, Advanced Systems International, SAC founder and lead software developer states that, “USB Lock RP (Remote Protect) is straightforward effective endpoint security software. Allowing organizations to authorize, from a central location, specific devices with ease and automatically block all other removable storage external hardware that could be used to extract data assets or to enter malware in your networked environment.” USB Lock RP’s operation is automatic, alerting, logging, authorizing or blocking device connections in real-time. Installation is simple and, for large networks, the client side setup is provided in MSI format so initial remote deployment can be done silently and with ease.

US Diversified Tech, LLC focuses on addressing government and corporate computer security issues and is well respected for working closely with IT and management in finding security solutions that best meets the individual situation. For further information and a 15 Day Free Trial of USB Lock RP or to view our other security solutions, visit the US Diversified Tech websites at www.AdvanSysUSA.com or LaptopSecuritySolutions.com. We can be contacted at (888)-361-8718 to address any technical, sales or dealer inquires.

Via EPR Network
More Software press releases

Athena Security Achieves OPSEC Certification from Check Point

Athena Security Inc., today announced that its Firewall Analysis solution, FirePAC, has achieved OPSEC™ (Open Platform for Security) certification from Check Point Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet. Through OPSEC certification, FirePAC supports Check Point’s Market-leading NG, NGX R65 and R70 based on the software blade architecture and delivers comprehensive analytics for maintaining always secure, always tuned and always compliant firewall infrastructure.

Athena Security Achieves OPSEC Certification from Check Point

FirePAC boosts the usability and security effectiveness of Check Point installations by delivering on these key requirements for network/security engineers:

Check Point Migration Support

• Dramatically accelerate the migration process from other vendors and ensure that the target policies are equivalent to the original. Athena FirePAC is the only solution that can analyze and compare the policies for behavioral differences and provide remedies for the errors introduced through the conversion process.

Comprehensive Risk Mitigation

• Identifies risks to critical hosts based on overly permissive rules or rules allowing dangerous services.

• Provides flexibility to define your own custom security zones and create new checks or modify existing checks to reflect unique business requirements.

• Takes into account what networks are reachable from each interface in the firewall based on ACLs, NATs, routing and anti-spoof settings to provide a more precise risk analysis.

Firewall Rule Cleanup and Optimization

• Finds every possible type of structural rule redundancy to find more rules for removal than any other product.

• FirePAC can also find all unused rules based on log history.

• Recommends optimal rule order that places the most used rules as far up as possible towards the top of the rule base without causing any disruptions to critical business services.

Rule/Object Search across your firewall inventory

• Finds all references to an object including parent and child relationships.

• Cuts through objects with multiple levels of membership hierarchies to pinpoint the services and addresses allowed or denied by a rule.

PCI Audit

• Produces automated PCI audit reports that go beyond a checklist for minimal compliance. FirePAC computes permitted traffic flows through the firewall to determine what is allowed to reach your credit cardholder data.

Via EPR Network
More Software press releases

Athena’s Firewall Browser Was Introduced At SANS Orlando 2010 To Over 1100 Attendees

Athena Security announces the release of Firewall Browser, a free tool for searching Cisco, Check Point and Netscreen configurations that is powerful and flexible enough to support IT departments of all sizes and process requirements. Firewall browser is available as a free download with no limitations, user license restrictions or registration hurdles f r o m www.athenasecurity.net.

Athena's Firewall Browser Was Introduced At SANS Orlando 2010 To Over 1100 Attendees

Athena chose the SANS Orlando 2010 Conference to unveil the new free tool, and working with conference organizers, distributed Firewall Browser to over 1100 network and security engineers in attendance, an oversubscribed showing for one of the premier and most comprehensive security training conferences. Just within 24 hours of announcing the tool, an additional 480 engineers downloaded the product directly f r o m Athena’s website.

Firewall Browser offers capabilities that network/security engineers will want to consult every time a change request is made or whenever troubleshooting on firewalls becomes necessary. The tool immensely eases the challenges to determine if the change is already covered by other rules, understand the impact of modifying objects, identify how existing conventions can be reused to keep the configurations manageable, or the right location for adding the new rule so service availability is maintained to critical hosts.

Firewall Browser was developed in the spirit of other legendary free and open source network tools like Nessus or Snort, based on the value that functionally-rich non-commercial alternatives should exist for practitioners who need access to reliable solutions for real environments. By releasing the Firewall Browser for free, Athena is shifting dynamics away f r o m vendors and giving the power to users to pay only for solutions where they find even greater productivity gains, technology advancements and complimentary product offerings.

“We selected one of our most popular features to offer a free tool. This is not throw-away functionality, but rather significantly useful. We believe this is the right way to attract customers to the additional tools available f r o m Athena,” said Adarsh Arora, CEO of Athena Security.

About Athena Security
Athena offers infrastructure analysis tools that identify the precise relationship between firewall rules and network services in a single device or across a complex network.

Via EPR Network
More Software press releases

toKaos – A New Actionscript Encrypter

toKaos is a desktop software application which allows you to encrypt/obfuscate your Adobe Flash/Flex AS3 application or Flash Document Class.

toKaos is able to operate directly on a copy of your source code providing you with a new encrypted/obfuscated source code.

toKaos is able to encrypt the identifier below:

  • packages identifier
  • classes identifier
  • functions identifier (private, internal, protected and public)
  • functions parameters identifier
  • functions variables identifier
  • class variables identifier (private, internal, protected and public)

Not only encryption, but toKaos is able to obfuscate your source code as follows:

  • change package structure
  • source compacting
  • explode included files
  • remove comments

After toKaos encryption/obfuscation your source code will be unreadable to everyone.

Actionscript Encrypter

For more information contact toKaos support Team at support@tokaos.com or
visit the product websites
http://www.tokaos.com or http://www.actionscriptobfuscator.com (mirror)

About K-SOL
K-SOL has been operating in the IT sector since 2001, the year of its foundation. The company is involved exclusively in the design and production of software systems on various platforms and utilises the most modern technologies.

Via EPR Network
More Software press releases

Multifactor Secureauth For Remote Access Enables Enterprises To Become PCI Compliant Via Strong Authentication Of Their Remote Access Users

MultiFactor Corporation, an innovator in 2 factor authentication, web application security and VPN Authentication solutions today announced the availability of SecureAuth 4.9.5 for VPN Authentication, a secure access solution addressing specific PCI compliance requirements for large enterprises.

The PCI Data Security Standard (DSS) requires execution of various disciplines representing security standards, requirements for security management, policies, procedures, network architecture, software design and other critical protective measures for maintaining consistent data security on a global basis. PCI DSS requirement 8 and 8.5 state that users with computer access should be granted unique IDs and be authenticated accordingly. SecureAuth executes beyond the mandates of both requirements and addresses the concerns surrounding enterprise authentication for remote access users.

In conjunction with major VPN platforms, including Cisco ASA and Juniper SSLVPNs, MultiFactor SecureAuth is able to deliver a secure credential, mapped directly to the individual user. SecureAuth utilizes the enterprise’s already existing data store shared by the Juniper or Cisco network appliance; eliminating the need to create or replicate an additional data store.

“PCI DSS has specific requirements concerning remote access to controlled systems. The guidelines specifically make reference to the authentication mechanisms that SecureAuth utilizes to protect the resources that require PCI compliance.” says Craig Lund, CEO of MultiFactor Corporation. “In addition, multi-factor SecureAuth complies with all the administrative and logging provisions that PCI requires.”

SecureAuth, secure in administration, access, and logging; all of which are PCI DSS requirements, is ideal for financial and commercial enterprises looking to meet these guidelines with a secure, cost-effective solution. SecureAuth is advantageous to the enterprise, in that it is a self-contained dual factor authentication solution, providing user authentication, administration, and logging on the same appliance. The SecureAuth solution is a one-stop solution for enterprises seeking to meet PCI guidelines. For more information, please visit http://www.multifa.com

About MultiFactor Corporation 
MultiFactor Corporation is pioneering the delivery of the strongest, proven 2-factor authentication, web application security, IPSec and SSL VPN security methodologies in an easy-to-deploy, low-maintenance product called SecureAuth™. This tokenless, browser-based authentication solution generates and validates client- and server- side certificates without PKI. SecureAuth represents the evolution of a technology that, for more than two decades, has remained the de facto standard for identity and access management technology. More secure than hardware or software tokens, SecureAuth is inexpensive to acquire, deploy and manage. MultiFactor Corporation’s innovation and its development of real-world security solutions draws from a diversified team of cryptographers, network and Web application specialists and certified security engineers.

Via EPR Network
More Software press releases

Zamzom.com Offers New Free Parental Control Software

Zamzom.com, is proud to announce its new free parental control software. The software is easy to use and allows parents the ability to block questionable websites and monitor their kids’ time online. The software also helps keep kids safe from cyberbullies.

“Kids today have created an interactive world apart from adult knowledge and supervision. Because bullies tend to harass their victims away from the adults, the Internet is the perfect tool for reaching their victims. Zamzom is an ideal way to protect your children from becoming these bullies’ next victims,” says Per Hansen of Zamzom.com.

Zamzom control is an all-in-one solution. The program gives parents the opportunity to:

– Take a screen-shot of the desktop at specific time intervals
– Alert parents by email when the computer starts up
– Inform parents which programs have been used with specific dates and times
– Inform parents which websites have been visited with specific dates and times
– Block websites or ip addresses

Zamzom Control has a very user-friendly interface and does not require any specific computer knowledge. It is visible in the system tray and is password protected. Zamzom recommends that parents explain to their children and other computer users why they have installed the software and let them know how it works. For more information, please visit http://www.zamzom.com.

Via EPR Network
More Software press releases

Insight Video Net, an automated media management software innovator and Mango DSP, a leading developer and manufacturer of intelligent video surveillance devices announced today that the two companies form a strategic partnership

Insight Video Net, an automated media management software innovator and Mango DSP, a leading developer and manufacturer of intelligent video surveillance devices announced today that the two companies have developed a strategic partnership. Mango DSP provides advanced networked video solutions for the CCTV, video surveillance, Homeland Security, and Defense markets and Insight Video Net delivers networked video software solutions that are embedded in the public safety market and have introductions into the casino, education and retail markets. Insight Video Net is recognized as experts in mobile video management and has designed some of the world’s leading mobile video solutions.

Insight Video Net will integrate the Mango DSP Raven X2 PC104+, an intelligent video server, into several products including the Central Management System (CMS), an automated media management software; ResoluteTM Interview Room, a software application that allows interview room footage to be wirelessly streamed to multiple locations simultaneously; and Mobile Management System (MMS) a mobile (in-car) video solution that wirelessly transmits video from vehicles to a central server location. The Raven-X2 104 has met the Cisco Technology Developer Program criteria for interoperability with the Cisco 3200 wireless video router and has been integrated to deliver surveillance solutions for the evolving market needs such as police cars and unmanned devices. The new solution is packaged in a rugged form factor, ensuring operational continuity in extreme surroundings.

“Insight Video Net chose the Raven-X2 104 because of its ability to deliver outstanding video performance under the harshest environmental conditions,” says Miles Cowan, Chief Technology Officer, Insight Video Net. “Our respective teams have been working very closely to assure we deliver a quality solution that meets both of our customer’s diverse needs.” Joel Moss, CEO, Mango DSP Inc., said “We are looking forward to partnering with Insight Video Net. Their proven expertise in mobile video management, public safety, and video security solutions combined with Mango DSP’s long leadership position in intelligent video processing is a formidable combination”

About Insight Video Net
With experience in networked digital video and data management, Insight Video Net has developed an effective system to manage video from fixed and mobile applications. They provide powerful management tools that make it easier to automatically store, manage and protect important video-video that can help protect people and property, fight crime and increase security. Public safety, school districts, casinos, and retailers nationwide count on Insight Video Net for powerful, easy-to-use software, reliable system integration and ongoing support. For more information about Insight Video Net, go to
www.InsightVideoNet.com

About Mango DSP
Mango DSP is a developer and manufacturer of intelligent video surveillance devices. Mango’s encoder, DVR and IP Camera technology powers many of the OEM solutions sold by fortune 500 companies in the Homeland Security, Defense, Retail, Mobile and Transportation markets. Mango’s encoder, DVR cards and IP Cameras are powered by Mango IVS(tm) (Intelligent Video Server) Operating System. This patent pending technology combines state of the art H264 encoding with 3rd party analytics. For more information, visit
www.mangodsp.com.

Via EPR Network
More Software press releases

SecureAuth integrates award-winning 2-factor authentication into IBM Tivoli Identity and Access Manager V1.0 and IBM Tivoli Unified Single Sign-On V1.0

MultiFactor Corporation, an innovator in 2 factor authentication, web application security and SSL VPN Authentication solutions, today announced that SecureAuth, its award-winning, 2-way authentication solution, has been integrated into IBM’s new Tivoli Identity and Access Manager V1.0 and IBM Tivoli Unified Single Sign-On V1.0.

The new IBM Suite provides the ability for the enterprise to allow access to network and web resources with federated single sign on, inside, outside and between organizations. SecureAuth strongly authenticates the user and provides the enterprise a valid session ticket that is used for access to a single application or across multiple domains and organizations.

“The combined SecureAuth and Tivoli Unified Single Sign On products enable the enterprise to securely and easily manage digital identity from the first user registration all the way through de-provisioning an inactive user,” said Garret Grajek, COO of MultiFactor Corporation. “SecureAuth integrates natively into Tivoli’s standard authentication policies utilizing native WebSeal authentication junctions. SecureAuth requires no additional coding for Tivoli integration.”

SecureAuth adds 2-way, client server authentication to the Tivoli offerings. This provides massive scalability of the Tivoli infrastructure which is often used to front-end large WebSphere applications. No additional database infrastructure is required in the SecureAuth model. SecureAuth utilizes the native directory store of the IBM TAMeb infrastructure. SecureAuth can also utilize MultiFactor Corporation’s unique array of web services to securely register end-users for the lowest possible user friction in their authentication experience.

MultiFactor Corporation is the leader in strong, simple to use, dual factor authentication. Its flagship product, SecureAuth, is a true plug-n-play authentication mechanism that allows secure access into the enterprise network and application resources. Enabling the enterprise to cost effectively harness the true power of the network. For more information or a demonstration of SecureAuth, please visit multifa.com.

About MultiFactor Corporation
MultiFactor Corporation is pioneering the delivery of the strongest, proven
2 factor authentication, web application security, IPSec and SSL VPN security methodologies in an easy-to-deploy, low-maintenance product called SecureAuth™. This tokenless, browser-based authentication solution generates and validates client- and server- side certificates without PKI. SecureAuth represents the evolution of a technology that, for more than two decades, has remained the de facto standard for identity and access management technology. More secure than hardware or software tokens, SecureAuth is inexpensive to acquire, deploy and manage. MultiFactor Corporation’s innovation and its development of real-world security solutions draws from a diversified team of cryptographers, network and Web application specialists and certified security engineers. For more information, please visit multifa.com.

Via EPR Network
More Software press releases

Simwalk Transport Is The World’s First Passenger Flow And Station Optimization Simulation Software Package Combining Pedestrian Simulation And Transit Station Dynamics

In a world first, Savannah Simulations AG has released SIMWALK Transport, the most powerful software solution, based on the leading pedestrian simulation software package SIMWALK, for simulating and analyzing all passenger movement issues in train, metro and bus stations.

SimWalk Transport is the first commercially available software package to optimize passenger comfort and efficiency, station design and related objects (platforms, passages, stairs, escalators, elevators etc.), as well as efficiency of timetables, passenger transfer times and connections. In addition, it provides analysis of evacuation and emergency issues. Based on its leading pedestrian algorithm, SimWalk Transport is the comprehensive simulation solution for passenger flow analysis and station development.

SIMWALK TRANSPORT has been developed in close cooperation with its Scientific Advisory Board, world leading experts in pedestrian and traffic simulation. The product has already encouraged requests from public transport officials and consultancies around the world.

One unique selling point is that SimWalk Transport is the only software fully specialised on public transport transit facilities and passenger flow analysis. It includes the most comprehensive set of features – as for example integration of timetables and network simulation analysis – that sets it apart from non-specialised software.

Alex Schmid, managing director at Savannah Simulations AG, “In developing SimWalk Transport we have reacted to an extensive market pull as rail, metro and bus operators of all sizes are troubled by increasing passenger demand over the next years that cause massive problems for transport operations and facility management.

“Simulating and analyzing passenger flows is a missing gap in transport analysis so far,”continues Schmid, “and with SimWalk Transport we’re offering a comprehensive tool to improve station operations and passenger security and efficiency.” Station operators and planners constantly have to adapt transit facilities to the increasing capacity needs of public transport. Most if not all changes directly influence or are influenced by passenger issues like changing trains, transfer times, walking comfort or dwell times.

SimWalk Transport allows to analyse the impact of different planned station layouts (additional platforms, passages, stairs, other objects etc.) on passenger flows, be it a new planned station or a station refurbishmment. Highly important objects like platforms as well as under- and overpasses can be analyzed according to Levels of Service and other comfort and security measures.

Designed by transportation engineers for transportation engineers, SimWalk Transport fills this operational gap by allowing to simulate realistically every single passenger with its station specific behavior – boarding and alighting, dwell time, connection transfer, shopping etc.

For the first time, an integrated, comprehensive simulation solution helps transport planners and railway authorities to include passenger movement issues into their operational planning of stations, for example by evaluating dwell times or by optimizing timetables.

About Savannah Simulations AG
Savannah Simulations AG, a swiss based simulation company, is a leading provider of advanced geosimulation software and spatial modeling and simulation services. Geosimulation is concerned with the design and application of spatial models and simulation software to solve real world problems in geographic contexts.

From simulation of pedestrian flows to urban planning, from evacuation simulation to supply chain optimization, we apply the science of simulation and optimization to discover opportunities and solutions in complex spatial environments.

Savannah Simulations AG has a network of consultants and international resellers who offer the company’s products along with services such as ongoing customer support, training, integration consulting and product customization.

Via EPR Network
More Software press releases

SpamAid 4.0 – a Microsoft Outlook add-on that keeps your Inbox clean of unsolicited emails

SoftLogica announces SpamAid 4.0, a new version of its Microsoft Outlook add-on designed to keep your Inbox clean of unsolicited emails.

The program is based on Bayesian filtering technology. It automatically learns using your personal correspondence to increase the filtration accuracy. Quarantined e-mails are stored in a separate ‘Spam’ folder. Users can manage their friends and enemies lists or build their own filters. The program has an option to test outgoing mail for potential risk of being filtered as spam. Recognition of newsgroup messages using Safe Recipients list and automatic inclusion of outgoing mail recipients into Friends List are available. SpamAid is provided with POP3, IMAP, HTTP and MS Exchange support.

What’s new in version 4.0:

– Ability to automatically delete undoubted Spam. If you face a very high spam load, you may lose a lot of time browsing the content of your ‘Spam’ folder to check for good messages filtered by mistake, because no spam filter is perfect. However, considerable amount of messages can be recognized as spam with 100% accuracy. Now you can configure 5 rules for SpamAid to delete such messages immediately while putting all other suspicious messages to the ‘Spam’ folder for further possible review.

– Potentialities of wildcards for phrase filtering. You can use wildcards when specifying the spam/non-spam recognition keywords to deal with phrase variations.

– Outlook 2003 style interface. With this new interface style the product will fit perfectly to the modern versions of Microsoft Outlook.

Pricing and Availability:

SpamAid is designed for Microsoft Outlook 2000/XP/2003 and priced at $29 USD per license. Volume discounts are available. Free technical support is provided by e-mail and by phone.

The 30-day trial version with full set of features: http://www.spamaid.com/spamaid.exe Program Interface Screenshot: http://www.spamaid.com/spamaid.gif Interface Screenshot, Jewel Case and Company Logo images in printable quality (TIFF, CMYK, 300 dpi): http://www.spamaid.com/spamaid-artwork.zip (1.64 Mb).

IT reviewers are encouraged to use this press release and any other related materials. We will be pleased to grant you a free license key. If you do not consider electronically distributed software, please e-mail us with the details of your postal address and we will send you a retail package. CD editors are authorized to include the 30-day trial version of SpamAid in their CD-ROMs.

Via EPR Network
More Software press releases