Motorola helps firms protect data

Motorola helps firms protect data

Network Security June 1995 security and messaging security respectively. A security check tool called Survey, as well as consulting services and all...

144KB Sizes 1 Downloads 95 Views

Network Security

June 1995

security and messaging security respectively. A security check tool called Survey, as well as consulting services and alliances complete the picture. In short, lnnersceptor is essentially a firewall system which conducts security checks: Signet consists of five subsystems which allow for the securing of a message as well as encryption and decryption. In terms of alliances, Motorola has already partnered with Hewlett-Packard to provide their corporate IT division with a tailored security system. President of H & M Consulting, Mark Macgillivray said that while Motorola is well positioned to offer security solutions, it is too early to pinpoint the effectiveness of the company’s offerings. “As a big chip and communications company they are certainly in a strong position to [influence] security standards”, Macgillivray said. “But everyone is worried about secure transactions.. . and they are not the only company in the world doing work in the security arena. They would have to come out with a [solution] to please everyone. Erin English

Network security assessment tool Intrusion Detection Inc. has announced the release of Version 2 of the Kane Security Analyst (KSA), a network security assessment tool for Novell’s NetWare Directory Services (4.x) and NetWare 3.x LANs. The aim of the product is to provide LAN administrators, corporate security officers and auditors with security reports

01995 Elsevier Science Ltd

on their enterprise-wide Novell 4.x and 3.x LANs. The KSA assesses the overall security status of a Novell network and reports on LAN security in six areas: password strength, access control, user account restrictions, system monitoring, data integrity and data confidentiality. The new version includes the ability to assess security on 4.x directory services networks, notify if unauthorized users can gain excessive access without logging in and uncover invisible user-t Ds. It is also possible to reveal supervisor trap doors, provide access control maps for security tracking of excessive rights and summarize enterprise-wide security across all 4.x servers. for further information, contact: Donna Hegdahl; +I 8172675798.

tel:

Motorola helps firms protect data Motorola have announced a new business aimed at protecting corporate data networks from crooks and malicious hackers, reports the Wall Street Journal. The company plans to aggressively push corporate use of software that can scramble data to keep electronic messages unintelligible to anyone who intercepts them. But it is also promoting a system that will let companies keep a copy of the mathematical key to unscramble messages by their employees. Companies will increasingly need to know the key escrow system to get access to key corporate information, in the event employees die or are otherwise unavailable to unlock their files. Key escrow is just one of Motorola’s elements in the security push. Other offerings will include firewall software, currently being

tested by Hewlett-Packard Co. based in Palo Alto, California. As the Internet boosts the concept of electronic commerce, Motorola expects the market for security products to grow to $3 billion by 1999.

Financial data bat ked up by ISDN Given the critical nature of the applications run over financial networks, resilience and back-up are crucial elements in the infrastructure. The failure of one or more circuits can easily interrupt the flow of business transactions conducted over the network. Backup can now be carried out with Primary Rate unit ISDN. Produced by Fivemere Ltd, the unit, called the KBU PRM, is both a central and remote site solution which can replace the current alternative of a number of Basic Rate units. It can also be used for ISDN access applications where individual 64Kbits (or higher speeds) can be broken out from the ISDN pipe and used for point-to-point links, disaster recovery and on-demand bandwidth. For further information, contact: fivemere Ltd; tel: +44 1252 344313.

Internet security improved Security Dynamics has announced that its products SecurlD and ACE/Server systems can now integrate with Internet firewall products from Checkpoint Software Technologies, SOS Technologies, Border Networks Technologies and Technologie. According to the company, network managers are now

7