Providers beef up VPNs with security

Providers beef up VPNs with security

Computers and Security, Vol. 18, No. 3 cross-border piracy investigations of infringements on copyright and intellectual property. This authority sho...

128KB Sizes 0 Downloads 55 Views

Computers and Security, Vol. 18, No. 3

cross-border piracy investigations of infringements on copyright and intellectual property. This authority should also monitor, gather and disseminate information on piracy and on anti-theft activities, recommend legislative changes to audit and recommend actions against countries concerning their IP protection and enforcement regimes. In short, the European Union must pledge higher political commitment to fight counterfeiting and piracy, and ensure that their enforcement regimes actually work and reduce piracy. Perhaps most important in the fight against counterfeiting and piracy, however, is a clear government commitment to eradicating these activities. Member States can demonstrate this commitment and, at the same time, send a powerful message to all enterprises that software piracy is unacceptable, by legislating their own software use. The BSA urges member states to establish government policies prohibiting the procurement and use of illegal software and to develop detailed measures to implement these policies. The organization also recommends that the Community place anti-piracy high on its foreign relations particularly in negotiations with Accession Computer

Fraud

G Security, April

agenda, States.

1999, p. 3.

Providers beef up VPNs

with security, Salvatore Salamone. MCI WorldCorn Advanced Networks (MWAN) has introduced a series of managed security services. The offerings combine the people, technical expertise and security skills of acquired ANS and CompuServe Network Services groups that make up

MWAN. The company has announced a managed tirewall service dubbed InterManage which uses an MWAN InterLock firewall or the Check Point FireWallfor Solaris.The idea behind such managed security services is that they eliminate single points of failure. MWAN will also announce that these firewalls will be offered as turnkey systems, where a company can manage the security aspects of its own firewalls, while leaving the maintenance and support to MWAN.

Internet Week, February

22,

1999, p. 9.

20% annual increase on card fraud. In the UK, plastic card fraud has grown annually by 20% over the last four years and could cost businesses as much as L300 million per year by the year 2002, according to management consultancy group OSI. In an effort to

combat this problem, members Payment Clearing Services includes

all major

of the Association for (APACS) which

banks and credit companies

-

will

begin to implement smartcard technology. OS1 said that the process, involving an estimated 100 million debit and credit cards, will take roughly five years to complete at an estimated cost of A300 million. Conventional magnetic strip cards, which are relatively easy to counterfeit, will be phased out in favour of cards incorporating microchip technology. The new cards will incorporate sophisticated tems that are very difficult to corrupt.

encryption In addition,

sysOS1

is trying to encourage retailers to take advantage of the new smartcards by adopting a system called Cardholder Verification Method (CVM). This allows purchases made with the cards to be verified through a personal identification number making transactions even more secure. OSI’s director John Bragg believes that credit card fraud could be cut by as much as 50% within five years if banks, retailers and credit card conrpanies move together to take advantage of the new technology. The APACS conversion will be the first major implementation of the new technology anywhere in the world and was field tested last July with 120 000 cards in Northampton and Dunfermline. Computer

Fraud G Security, April

1999, p. 4.

Better

snapshots of enterprise security, Yutrell Yasin. Enforcing security policy across a distributed enterprise network can be a difficult task. IT managers have to use a variety of tools and wade through reams of reports to determine if their companies’ applications and systems conform to corporate security practices. Axent Technologies is attempting to lighten IT managers’ workloads with a new version of Enterprise Security Manager software that lets security managers check, manage and enforce security policies from a central console. ESM 5.0’s new console and advanced reporting features provide a snapshot of security levels across the enterprise in a single graph. Using ESM, IT managers can identity and prevent users from having security privileges that exceed company security policy. In addition, ESM users can identify files that are not getting backed up or files whose attributes have been changed. Having a more comprehensive view of security levels doesn’t mean IT managers will suffer information overload, because ESM 5.0 has strong

233