Whitepapers - IT and IT-Security
Mar. 11, 2011
Protecting against the weakest link
WikiLeaks has come to international prominence (or notoriety, depending on your perspective) for its work in publishing private, secret and classified materials obtained via leaks from government sources.
WikiLeaks has published top-secret information from the U.S. military's wars in Iraq and Afghanistan, and has also shared thousands of pages of U.S. State Department cables with the world.
The U.S. government and other governments around the world are learning that in the age of WikiLeaks, no secret is safe. moreFeb. 10, 2011
Starting in November 2009, coordinated covert and targeted cyberattacks have been conducted against global oil, energy, and petrochemical companies. These attacks have involved social engineering, spear-phishing attacks, exploitation of Microsoft Windows operating systems vulnerabilities, Microsoft Active Directory compromises, and the use of remote administration tools (RATs) in targeting and harvesting sensitive competitive proprietary operations and project-financing information with regard to oil and gas field bids and operations. moreApr. 28, 2010
For secure remote maintenance and diagnosis of machines and systems via the Internet, Innominate has developed a highly-available 19-inch network security solution, which is used in service centers as a high-end firewall and VPN gateway. There it handles the specific requirements for building VPNs and then maintains these secure virtual private network connections to remote industrial systems. Because this node is responsible for up to 1,000 simultaneous VPN connections, the highest availability requirements are placed on it. moreApr. 21, 2009
Although an organization’s IT infrastructure is typically built to handle large amounts of data, including that of video surveillance applications, many operators are not fully leveraging the functionalities of their investments to optimize bandwidth capacity. Multicasting, multistreaming and video compression are three innovative methods that users can use to optimize bandwidth management in video surveillance applications. more