RSS

Monthly Archives: August 2007

Symantec launches Norton Internet Security 2008, Norton Antivirus 2008

Symantec Corp. announced the launch of Norton Internet Security 2008 and Norton AntiVirus 2008, industry leading security solutions that have been enhanced to provide computer users with comprehensive protection against new and emerging online threats, including disguised attacks used by drive-by downloads. In addition, Norton Internet Security 2008 will also feature Norton Identity Safe to protect users’ identities when they buy, bank or browse online. The company has also optimized each product for greater performance, improved technical support and reduced user interruption. With Norton 2008 products, users have powerful solutions that effectively guard against new threats and extend protection beyond the PC to wireless home networks and online identities.

“Our 2008 products bring valuable new protection technologies to block threats before they get a foothold in systems as well as significant performance improvements to make the end-user experience better than ever before,” said Janice Chaffin, group president, Consumer Business Unit, Symantec. “With next-generation security tools and enhanced performance, Norton Internet Security 2008 and Norton AntiVirus 2008 help deliver on Symantec’s promise to provide confidence in a connected world.”

New to Norton in 2008:
Browser Defender — Defends against drive-by downloads and other new or unknown threats that exploit vulnerabilities in Internet Explorer. Revolutionary, zero-day proactive protection against obfuscated code attacks using ActiveX, JavaScript™, and VBScript that specifically target the browser.

Norton Identity Safe — Keeps personal information and identity safeguarded when buying, banking or browsing online. It enables users to control which information is shared with Web sites, stores private information securely, and fills in passwords and Web forms automatically. It stores and encrypts passwords and other confidential data, automatically retrieving it at a user’s request to save time and protect it from being stolen by eavesdropping keystroke loggers. (Included in Norton Internet Security 2008 only)

One-Click Support — Delivers the same convenient access to support options previously available in Norton 360. This all-new approach to support automatically troubleshoots common issues such as connectivity, licensing, and product activation. It also provides direct access to tech support via telephone, free email or free live chat — all from within the main user interface.

Home Network Feature — Maps connected devices to provide a view of devices on the local network. Monitors the overall security status of other computers with Norton Internet Security 2008 or Norton AntiVirus 2008 installed. In addition, within Norton Internet Security 2008 this feature checks the status of wireless network security, alerts users when they connect to an unsecure wireless network, and provides expert advice to help users manage network security settings. Wireless network security status provides recommendations for securing wireless routers along with educational information about home network security.

Performance, Performance, Performance — Building on performance enhancements delivered in the 2007 product line, Symantec has raised the bar and further extended performance gains with significant improvements in key performance measures. Compared to Norton Internet Security 2007, the 2008 user interface responds 22% faster and completes a quick scan up to 39% faster. And as compared to an industry average of nine competitors, Norton Internet Security 2008 leads across five key performance areas including boot time (20% faster), memory usage (69% less), full scan (12% faster), user interface response (54% faster) and download speed (31% faster).*

Additionally, both products include the powerful SONAR behavioral detection technology that protects against malicious code before standard virus and spyware detection definitions have been created. In Norton Internet Security 2008, SONAR will run a full scan every time an application attempts outbound communication, further protecting identity information by improving the firewall’s effectiveness against unknown threats. This breadth of new functionality complements the rich existing security protection of Norton Internet Security, which includes class leading rootkit protection capabilities as well as new Threat Interceptor vulnerability protection technologies. Threat Interceptor technologies include: Threat Interceptor – Browser Defender; Threat Interceptor – Intrusion Prevention; and Threat Interceptor – Generic Exploit Blocking. Norton Internet Security also includes all of the features and functionality of Norton AntiVirus which continues to be the gold standard in virus detection garnering 33 consecutive Virus Bulletin 100 awards, an unmatched standard of reliability in the industry.

Norton AntiVirus 2008 and Norton Internet Security 2008 are backed by Symantec Security Response, a team of dedicated intrusion experts, security engineers, virus hunters, and global technical support teams that work in tandem to provide extensive coverage for enterprise businesses and consumers. Symantec Security Response provides customers with comprehensive, global, 24×7 Internet security expertise to guard against today’s complex Internet threats. This security information is delivered to our customers on a daily basis to ensure they remain fully protected.

 
Leave a comment

Posted by on August 31, 2007 in Symantec

 

UK-based Prudential Selects SAP CRM in Asia

SAP Asia Pacific Japan announced that Prudential plc’s Asian fund management arm, one of Asia’s largest and most successful fund managers, has selected SAP to improve operational efficiency and to better service their clients. The company will implement the SAP CRM solution for 7,000 internal and external users across Asia.

SAP CRM powered by SAP® NetWeaver will provide their fund management business in Asia with strong business process integration and master data management capabilities which provides a 360 degree view of the customer across all customer-serving channels in the company. The strong collaborative and analytical capabilities are also important for processes such as planning and monitoring business operations across different organizational units and geographical boundaries.

The SAP CRM solution will enable better communication and synergy among marketing, sales and customer service teams resulting in a greater total customer experience for their fund management clients, regardless of which channel they choose to interact with the company. In addition, implementing the solution will provide the company with the capability to accurately forecast and monitor its business across the region in real-time.

“The right CRM software platform is critical to a company’s ability to serve customers efficiently and have accurate insights into its business performance,” said Eric MacDonald, President and CEO, SAP Southeast Asia. “This strategic partnership is very significant to SAP and it provides SAP with the momentum for more success in the financial services industry, one of the fastest growing markets in this region.”

SAP’s CRM leadership has been recognized by analysts in numerous countries and industries across the globe. Most recently, SAP achieved leader status in Forrester Research’s “Enterprise CRM Suites for Financial Services, Q1 2007” report.

 
1 Comment

Posted by on August 31, 2007 in SAP

 

Autodesk Announces Magic Wheels as Inventor of the Month for August 2007

Autodesk, Inc. announced that Magic Wheels, Inc., a developer of multigear wheel systems for manual wheelchairs, has been named the Autodesk Inventor of the Month for August 2007.

The Inventor of the Month program (www.autodesk.com/inventorofthemonth) recognizes the most innovative design and engineering advancements made by the extensive community using Autodesk Inventor software. Magic Wheels’ selection as Inventor of the Month for August bears particular significance, as August is National Inventors Month in the United States to recognize invention and creativity.

Magic Wheels was co-founded in 1996 by Steve Meginniss, the successful inventor and product developer of the Sonicare toothbrush, the Clarisonic skin care system and the Quinton Quik-Prep electrodes used in stress testing. The company sought to improve the wheel systems for rear-push manual wheelchairs, which had essentially remained unchanged for 150 years. Traditionally these wheels provided only one gear, which made it difficult for wheelchair users to ascend and descend hills, or navigate rough and uneven surfaces.

To address these challenges, Magic Wheels developed the MAGICWHEELS two-gear wheelchair drive. This mechanical wheel system works much like a two-speed bicycle, providing the user with two easily shifted gears for extraordinary mobility enhancement to navigate ramps, hills and all types of varying terrain. Additionally, the availability of different gears lessens the incidence of repetitive stress injuries to the shoulders, arms and hands due to high driving loads.

Autodesk Inventor software was integral to the development of the MAGICWHEELS product, which evolved over a nine-year period. As the foundation for Digital Prototyping, Inventor allows manufacturers to simulate the real-world performance of a design before it is built.

“In the process of literally ‘reinventing the wheel,’ we had to explore a lot of different design ideas,” said Cisco Sabin, mechanical design engineer at Magic Wheels. “By creating digital prototypes in Inventor, we were able to fully explore and optimize our designs before producing expensive physical prototypes.”

“There has never been a more exciting time to be an inventor than now,” said Robert “Buzz” Kross, senior vice president of Autodesk Manufacturing Solutions. “Companies like Magic Wheels are using Digital Prototyping to refine the invention process, leveraging software that is as groundbreaking as their ideas. We are thrilled to name Magic Wheels as our Inventor of the Month for August. They are a true embodiment of the creativity and innovation that National Inventors Month represents.”

 
Leave a comment

Posted by on August 30, 2007 in Autodesk

 

New Intel vPro Processor Technology Fortifies Security for Business PCs

Intel Corporation further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better protection against hacking, viruses and other threats.

Intel vPro processor technology packages a powerful new Intel Core 2 Duo processor, Intel Q35 Express chipset and several technology innovations offering a host of security and management capabilities for desktop PCs, including some that were previously impossible, such as the ability to wake and repair a computer with an inoperative operating system or hard drive. As a result, businesses can reduce costs by limiting expensive and time-consuming deskside visits, and by improving power savings through the ability to turn off PCs and securely wake them when required.

Security features included in this latest Intel vPro processor technology (formerly codenamed Weybridge) are designed to protect against software-based attacks and also filter and defend against viruses and other threats.

“Today, the business desktop PC just got more secure,” said Robert B. Crooke, vice president and general manager of Intel’s Business Client Group. “This generation of Intel vPro processor technology arrives with new security and management capabilities along with support from every leading PC manufacturer and software solution vendor in the world.”

New in this product is Intel Trusted Execution Technology (Intel TXT, formerly codenamed LaGrande). Intel TXT protects data within virtualized computing environments, an important feature as IT managers are considering the adoption of new virtualization-enabled computer uses. Used in conjunction with a new generation of the company’s virtualization technology – Intel Virtualization Technology for Directed I/O – Intel TXT ensures that virtual machine monitors are less vulnerable to attacks that cannot be detected by today’s conventional software-security solutions. By isolating assigned memory through this hardware-based protection, it keeps data in each virtual partition protected from unauthorized access from software in another partition.

In addition, Intel enhanced its Intel vPro processor technology with improved System Defense Filters. These filters can identify greater numbers and varieties of threats in the network traffic flow.

The latest version of Intel vPro processor technology also offers an embedded trust agent, the first certified by Cisco, providing the industry’s only 802.1x compatible manageability solution not dependent on OS-availability. This trust agent offers Cisco’s IT customers the ability to manage systems, even if powered off or the OS is down, without lowering the security on 802.1x networks and Cisco* Self-Defending Network products.

Further boosting PC manageability is the newest generation of Intel Active Management Technology (Intel AMT). Intel AMT allows for inventory and repair PCs “out of band” – meaning even if the OS has crashed or the PC is turned off. Enhancements include convenient remote configuration tools and compliance with the latest industry standards. The company expects that PCs with this version of Intel vPro processor technology will be among the first to comply with the Distributed Management Task Force’s DASH 1.0 draft interoperability specification and Web Services Management (WS-MAN).

The new Intel Core 2 Duo processor and Intel Q35 Express chipset together will deliver improvements in energy-efficiency through a combination of performance increases and reductions in power consumption, thereby helping businesses support their own “Green IT” objectives and Energy Star requirements. For the highest-volume processor, the 2007 Intel vPro processor technology delivers 30 percent greater performance than the previous-generation product, while significantly reducing power consumption.

Major computer makers and channel resellers around the world are now selling desktop PCs with Intel vPro processor technology. Currently, more than 350 companies are deploying this technology worldwide ranging from the thousands to tens of thousands of PCs per business.

“Customers tell us that they want a partner that will help them simplify IT,” said Vivek Mohindra, vice president, Dell Product Group. “The OptiPlex 755 has the most flexible systems management capabilities, including Intel vPro processor technology, to drive more efficiency so IT professionals can focus on innovation rather than system maintenance.”

“Security and client management are top concerns for our customers’ business,” said Kevin Frost, Worldwide Vice President, HP Business PCs. “To address these customer demands, HP remains committed to supporting Intel vPro processor technology. Through providing its innovative capabilities on the industry’s broadest portfolio of desktops and notebooks, HP is the leader in delivering secure and manageable vPro-enabled desktops.”

“The new ThinkCentre M57 desktop combines Lenovo’s innovative ThinkVantage Technologies with Intel vPro technology to provide a secure and manageable desktop that reduces the total cost of ownership,” said Dilip Bhatia, executive director of Global Desktop Marketing, Lenovo. “Customers looking for a stable, secure and manageable PC will find our best-engineered desktop and notebook PCs simplify fleet management in any computing environment.”

Businesses can also enjoy energy-efficient performance, PC security and manageability along with wireless mobility on notebook PCs with Intel Centrino Pro processor technology which started shipping in May.

 
Leave a comment

Posted by on August 28, 2007 in Intel

 

Senate bill seeks to punish identity theft, misuse of personal info by firms

Sen. Loren Legarda has filed a bill seeking to penalize the rapidly emerging crime of “identity theft,” and to compel firms that handle a great deal of restricted personal information, such as banks and credit card issuers, to build in adequate precautions to prevent any breach of the right of privacy of individuals.

Under Senate Bill 1371, identity theft is defined as “fraud committed using the sensitive personal information of another individual, with the intent to commit, or to aid or abet any unlawful activity that constitutes a violation of any existing laws and results in economic loss to that individual.”

As proposed by the bill, “sensitive personal information” would refer to an individual’s first name and surname in combination with other details, such as those that relate to, but not limited to, an individual’s financial account, credit standing, health condition, and family tree.

The most common kinds of identity theft involve the stealing of another person’s information in order to defraud the government, such as through the diversion of pension checks; to deceitfully obtain credit, mostly from card issuers; or to make false insurance claims.

Under Legarda’s bill, identity thieves would be punished with up to 10 years in prison, or a fine of as much as P500,000, or both.

The same penalty would apply to persons or the officers and directors of firms that “misappropriate” sensitive personal information, once it is proved that the misuse became injurious to the person with whom the facts pertained.

In pushing the bill’s swift congressional approval, Legarda invoked the Constitution, which she said, “distinctly protects the right to privacy.”

“Based on the zones of privacy established by the Bill of Rights, every person clearly enjoys the right to be let alone, or the right to determine what, how much, to whom and when information about himself/herself may be disclosed,” Legarda stressed.

“Congress must now safeguard the right to privacy, which has become vulnerable to invasion and manipulation by corrupt individuals and entities that take advantage of new technology, including the spread of electronic databases,” she said.

An electronic database is a computerized collection of information produced to bring such facts together in one place or through one source so that these may be accessed by authorized persons.

Among the biggest generators of sensitive electronic databases are banks, credit card issuers and telecommunication service providers that, by the nature of their business, have to maintain large amounts of up-to-date customer or user personal details.

Legarda’s bill requires all entities that maintain sensitive personal information bases to develop and enforce reasonable security procedures against “any unauthorized access, destruction, use, modification or disclosure.”

They would also be required to establish prompt notification procedures once an individual’s personal information is violated, threatened or compromised.

The bill does not only cover private firms, but also public institutions with large repositories of personal data, such as the Social Security System, Government Service Insurance System, the Passport Office and the Land Transportation Office.

In the United States, a number of financial institutions have lost customer databases as a result of staff negligence, the unauthorized reproduction and sharing of files or high-tech theft by computer hackers. The losses have rendered millions of people exposed to identity theft.

 
Leave a comment

Posted by on August 27, 2007 in Government

 

Sun Microsystems to Change Stock Ticker Symbol to JAVA

Sun Microsystems announced that it will change its Nasdaq stock ticker symbol from SUNW to JAVA, the ubiquitous technology and brand it created in 1995. The stock ticker change will go into effect for the trading community on Monday, August 27, 2007.

“The Java brand and technology have evolved to be among the most pervasive on the internet, yielding extraordinary awareness for Sun and opportunity for the community that leverages it,” said Jonathan Schwartz, president and CEO of Sun. “More than a billion people across the globe, representing nearly every demographic, market and industry, rely upon Java’s security, innovation and value to connect them with opportunity. That awareness positions Sun, and now our investor base, for the future.”

The Java economy as a whole includes a broad array of businesses built with Java technology, from Google and eBay, to some of the world’s largest financial and telecommunications companies. The Java platform powers and is made visible via more than 2.1 billion mobile devices (Ovum 2007), nearly every PC on the internet and numerous consumer electronics and embedded systems products such as Sony’s Playstation 3 video game console. Sun estimates the number of consumers that recognize the ubiquitous cup and steam on Java’s brand logo to be in excess of a billion people.

Sun generates license revenues from Java technology, but more significantly derives revenue from the software, storage, servers, services and microelectronics that power the datacenters behind global Java deployments – whether on handsets, personal computers, or in the network. Sun believes its business is advantaged by such exposure, and the change in ticker symbol more effectively connects it with the marketplace.

 
Leave a comment

Posted by on August 24, 2007 in Sun Microsystems

 

EMC Forum 2007 Unplugged

EMC announced that it will hold EMC Forum 2007 Unplugged , a showcase for information storage and management best practices, in Makati City at the Hotel Intercontinental Manila on August 30, 2007. Targeted at business and technology executives, this one-day event will help Filipino businesses understand how to leverage information for competitive advantage. EMC Forum 2007 Unplugged is part of a global conference series organized by EMC. This year the titanium sponsor for “EMC Forum 2007 Unplugged” is Cisco Systems, the worldwide leader in networking that transforms how people connect, communicate and collaborate.

EMC Forum 2007 Unplugged will be hosted by broadcast journalist Christine Bersola-Babao, and will target more than 250 Filipino professionals across industry verticals. Focusing on innovative approaches to storing, protecting, optimizing and leveraging information, the event will provide unique perspectives on how organizations can avoid the risks and reduce the costs associated with managing their information, while fully exploiting its value for competitive advantage. Attendees will also have an opportunity to network with their peers and participate in a lucky draw.

“As the industry leader, EMC is committed to helping our customers and partners in the Philippines manage information growth and risk, while creating new value. Just as consolidating information enhances its value to an organization; getting our customers, partners and technology experts under one roof, provides tremendous value to the industry,” said Ronnie Latinazo, Country Manager, EMC Philippines. ” EMC Forum 2007 Unplugged will reflect the breadth and depth of EMC’s information infrastructure solution, to help customers keep pace with challenges and opportunities of managing and protecting information”, he added.

“Cisco and EMC have a long standing relationship that stems from our common vision in value generation for customers. As the network increasingly becomes the platform for all communications and IT, Cisco’s unique approach to data centers — tightly integrated with EMC’s solutions — enables our customers to virtualize their resources, consolidate previously silo-ed data centers and decrease power consumption,”,” said Cisco Systems country manager Luichi Robles.

At EMC Forum Unplugged 2007, delegates will have the opportunity to explore solutions for their most pressing information management challenges—through keynote presentations and break-out sessions on topics including:

•   Storing information more intelligently
•   Next-generation backup, recovery, and archive
•   Making protection effective and affordable
•   Automating data center operations
•   Virtualizing your information infrastructure
•   Leveraging content for competitive advantage
•   Securing critical assets
•   Accelerating business value for applications

 
Leave a comment

Posted by on August 23, 2007 in Technology