Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Demo Spotlights Enterprise Security tools

    Written by

    Jim Louderback
    Published February 19, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As more and more systems and users get hooked up to public networks, and as more and more wireless networks come on-line, IT managers are faced with a dual threat. How do I provide ready access to all my systems and data wherever my users might be, while still protecting vital corporate access?

      Two of the security systems load applets on workstations and servers, but secure different parts of a system. The last two offer radically new ways to encrypt data, and uniquely identify users.

      BBX Technologies: Viruses, worms, Trojan horses and other malware have been at the forefront of many users and IT managers recently. From viruses and worms like Slammer, I Love You and Anna Kornikova, to spyware like Back Orifice, unauthorized and rogue programs can wreak havoc inside and organization. In addition, some user behavior can unintentionally bring networks and systems to their knees.

      ImmuneEngine, a new protection product from BBX Technologies aims to control these incursions by blocking and removing unauthorized executables before they can run on a system.

      The system works by loading a small application on each machine, which monitors the Windows kernel, tracking the memory stack, mouse activity, keyboard activity and all of the message queues inside the system. When the application detects that an executable has been written to the system, it deletes that program before it can run. If an already running application starts behaving badly – as determined by system policies – ImmuneEngine attempts to remove it from the program stack without crashing the underlying system. Thus buffer overflow attacks, hidden email-based worms, and other malicious hidden programs are kept from running, and ruining a protected system.

      It wont stop everything, and its not designed to replace anti-virus and other signature-tracking apps. Instead, the company claims it provides a “last line of defense” for 32- bit Windows -based workstations and servers. It wont block everything, but it adds another layer of security to an existing environment. The client takes up only 3-4 megabytes of storage, and results in a 3% performance hit on a 700MHz computer.

      Pricing starts at about $175 per workstation, and is now available.

      Liquid Machines: This company solves a different part of the security problem, in a similar way. Rather than focus on protecting a system from rogue executables, Liquid Machines tries to protect the intellectual property contained in spreadsheets, documents and data files from being improperly altered or stolen. This has become an even more important security issue now that notebook computers have become so widespread, and its so easy to email a file to anyone.

      The Liquid Machines Information Security Platform, like ImmuneEngine, works by loading a small applet onto each secured PC or notebook. That applet then encrypts data files, and uses rules and group-based security policies stored on a central server to determine users level of access to those files.

      The companys software loads itself along with any application, and controls access to file creation, saving, deleting, copy and paste and printing functions. Based on a users security level, they can be restricted from even opening a file.

      The applet that runs on every PC includes a copy of all the policy rules contained on the server. When a file is opened, the system checks those policies to determine access level, and whether to decrypt the file at all. If a user is operating untethered, on a notebook or stand-alone desktop, the locally cached policies are used.

      However, the company has also implemented a time-out feature as well. If that policy is set for 2 days, for instance, then if the computer hasnt connected to the server during that interval, all file access is blocked.

      Its not foolproof – a truly determined thief can always take a snapshot of a screen with a digital camera, or grab a screen capture of sensitive data. But it does offer another level of key protection.

      The software and server will go into beta-testing next month, and should be available later this year. Liquid Machines is targeting financial institutions, pharmaceuticals and government agencies that need secure data protection even when a notebook has left the network. The server is expected to cost $35,000, while each client adds another $150 to the cost. Later in the year, they expect to extend the protection system to cover email and messaging as well.

      Hacker-proof Security: Two other fascinating high-level security applications were debuted as well. MagiQ showed off an intriguing technology, code named Navajo, that it claims is “hacker-proof. It works by using a quantum cryptographics — essentially a single photon transmitted over a fiber connection — to create unbreakable encryption. Its based on the laws of physics, and terribly complex. Head to the company site for more information.

      Skin-tight Security: As if retinal scans and fingerprints werent enough, Delean Vision showed off an identification technology using details of human skin. It uses standard PC webcams to capture a skin image, and then it compares that image to its database of users. It seems far out, but actually seemed to work.

      Secure Zip Files: PKZIP showed off a new version of its zip software that adds RSA BSAFE encryption to standard zip files. The company has made some strong efforts to integrate security and Notes/Outlook support into the program.

      Jim Louderback
      Jim Louderback
      With more than 20 years experience in consulting, technology, computers and media, Jim Louderback has pioneered many significant new innovations.While building computer systems for Fortune 100 companies in the '80s, Jim developed innovative client-server computing models, implementing some of the first successful LAN-based client-server systems. He also created a highly successful iterative development methodology uniquely suited to this new systems architecture.As Lab Director at PC Week, Jim developed and refined the product review as an essential news story. He expanded the lab to California, and created significant competitive advantage for the leading IT weekly.When he became editor-in-chief of Windows Sources in 1995, he inherited a magazine teetering on the brink of failure. In six short months, he turned the publication into a money-maker, by refocusing it entirely on the new Windows 95. Newsstand sales tripled, and his magazine won industry awards for excellence of design and content.In 1997, Jim launched TechTV's content, creating and nurturing a highly successful mix of help, product information, news and entertainment. He appeared in numerous segments on the network, and hosted the enormously popular Fresh Gear show for three years.In 1999, he developed the 'Best of CES' awards program in partnership with CEA, the parent company of the CES trade show. This innovative program, where new products were judged directly on the trade show floor, was a resounding success, and continues today.In 2000, Jim began developing, a daily, live, 8 hour TechTV news program called TechLive. Called 'the CNBC of Technology,' TechLive delivered a daily day-long dose of market news, product information, technology reporting and CEO interviews. After its highly successful launch in April of 2001, Jim managed the entire organization, along with setting editorial direction for the balance of TechTV.In the summer or 2002, Jim joined Ziff Davis Media to be Editor-In-Chief and Vice President of Media Properties, including ExtremeTech.com, Microsoft Watch, and the websites for PC Magazine, eWeek and ZDM's gaming publications.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.