RFID goes beyond inventory tracking

RFID goes beyond inventory tracking

Wal-Mart’s ambitious project to affix radio frequency identification (RFID) tags to merchandise has been the poster boy for RFID for...

October 30th, 2008 Grant Buckler

IBM vets ID management, access control on own systems

IBM vets ID management, access control on own systems

IBM software chief Steve Mills receives a monthly report on employees and contractors who have left IBM, and the actions...

October 2nd, 2008 Jon Brodkin

Juniper adds router, switch coverage to security manager

Juniper adds router, switch coverage to security manager

Juniper Networks has upgraded and renamed its centralized security platform to cover many of the company’s routers and switches, less...

August 4th, 2008 Howard Solomon

NAC vendor branches out, changes name to Autonomic Networks

NAC vendor branches out, changes name to Autonomic Networks

Vernier Networks has changed its name and its product mandate, as vendors who specialize only in network access control (NAC)...

January 13th, 2008 Tim Greene

Former FBI official urges tougher physical security

Former FBI official urges tougher physical security

SAN JOSE, Calif. -- Technology isn't the best -- or the only -- way to stop the physical theft of...

December 13th, 2007 Howard Solomon

Symantec prepares to lift curtain on Hamlet

Symantec prepares to lift curtain on Hamlet

LAS VEGAS – Symantec Corp. is set to release later this year its newest enterprise security platform, Symantec Endpoint Protection...

June 13th, 2007 Mari-Len De Guzman

IT sabotage, work behaviour linked

IT sabotage, work behaviour linked

COMMENT ON THIS ARTICLEWorkers who sabotage corporate systems are almost always IT workers who exhibit specific negative office behaviour, according...

March 1st, 2007 Manek Dubash

NAC deployment

NAC deployment

COMMENT ON THIS ARTICLENetwork executives planning to deploy network access control should start with very specific goals, not intricate schemes...

January 29th, 2007 Tim Greene

Momentum building for identity management

Momentum building for identity management

Identity management technologies are beginning to weave together the application and network layers of corporate networks, significantly improving access control,...

October 26th, 2006 John Fontana