Search Results



Bank Fraud Solution<div class="body"> <p>FraudMAP for Business Banking is a fraud prevention and risk management solution designed to support online business bank accounts. New from <span style="COLOR&#58;rgb(255,0,0);"><strong>Guardian Analytics</strong></span> of Los Altos, California, the solution analyzes, assesses, and highlights high-risk account activity in the complex multiuser business banking environment. It speeds the detection and investigation of online account take­over, whether attacks occur across multiple logins or as once-and-done-style attacks. Its predictive analytics-based risk engine and risk application address the unique characteristics of business banking. The solution can be purchased as a standalone solution or as a package with FraudMAP for Retail Banking. </p> </div>
Computer Lock<div class="body"> <p>Hong Kong-based <span style="COLOR&#58;rgb(255,0,0);"><strong>AC Element Company</strong></span> has released My­USBOnly 6.0, a Windows USB control and security application that prevents data theft through USB ports. Users create a white list of all allowed USB devices, including flash drives, external hard drives, MP3 players and other devices. The system keeps a re­cord of all attempts to gain access to the computer and can send e-mail notifications each time a USB device is attached to the computer. This version offers compatibility with the company’s new DeepMonitor Report Manager Console, an add-on report management tool that provides in-depth log information from each USB port. It also lets users deploy and configure the software remotely on all company computers. </p> </div>
Key Control<div class="body"> <div class="thumbnail"> <img title="" alt="" src="http&#58;//" width="144" height="144" /> </div> <p>Two smart CyberKey cabinets offer a new level of accountability and key control. Built by <span style="COLOR&#58;rgb(255,0,0);"><strong>Videx </strong></span>of Corvallis, Oregon, the rugged metal housings protect keys that are not programmed. An employee uses an RFID card or PIN to open the cabinet and again to request that a key be programmed and released. The released key contains the access permissions required. Any CyberKey that has been docked in a cabinet cannot be forcibly removed without destroying the key. When the key is returned to the cabinet, an audit trail of the key and lock activity is downloaded to the software. After the cabinet reports to the software, the key returns to an unprogrammed state. </p> </div>