The Eyes Have It on the Iris in Terms of Being Used for Identi- Tation in Another New Jersey District in 2003, Continued from Page 1 with a Single Pulse of Light
Total Page:16
File Type:pdf, Size:1020Kb
P.O. Box 85518 Lincoln, NE 68501-5518 CHANGE SERVICE REQUESTED July 28, 2006 Volume 28 Number 30 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 fully in compliance, so they just want to In This ISSUE be more compliant than the other guys so that whoever the regulatory body is will go COVER FOCUS after the other guy,” Bloomberg says. “Of Regulatory Compliance Compliance course, that’s really dangerous—more dan- Compliance is a fairly ho-hum topic, but it’s gener- gerous than speeding, in a way.” ating a lot of industry activity, including a new set Involve IT of manufacturers and related products. Handling compliance-related issues often Compliance Control ..........................................................1 requires complicated processes and proce- Compliance: Do I Need To Worry?....................................9 dures, though an increasing horde of solu- Coping With Compliance ................................................11 Control tions from software and service vendors gives companies a helping hand. Still, it’s a TECH & TRENDS How Regulations Are Changing difficult process integrating compliance Iris vs. Retina Biometrics | 1 into enterprise strategy, particularly when As implementations yield better results and costs The Enterprise IT Landscape employees struggle to understand that com- drop, iris recognition could be the biometric of pliance should be a regular choice for schools, data centers, and companies. by Christian Perry part of business operations • • • and not a separate proce- Create A Disaster Recovery Plan | 28 ALTHOUGH ROLLING EYES tend to greet dure. Many enterprises either fail to create plans for disas- any standard mention of compliance, In a survey sponsored ter recovery and business continuity or create plans there’s no denying the topic is a massive last year by the Security that are inadequate or quickly become outdated. concern for companies of all sizes. But Compliance Council, three while those same organizations struggle out of four organizations Pitfalls Of Server Virtualization | 29 to fall in line with the seemingly endless said they must comply with Virtualization’s potential to save money and to con- flow of regulations, others are brain- two or more regulations, solidate servers and storage is bound to appeal to storming methods to take advantage while almost half must any IT manager who works within a budget or has of them. comply with three or more limited space. Whether you’re talking Sarbanes- regulations. Meanwhile, Oxley, HIPAA, FISMA, Gramm-Leach- organizations are spending Application Monitoring | 30 Bliley, or other regulations, compliance an average of 34% of their Application monitoring of your network infrastructure spins a complex web for companies. IT resources on procedures via automated hardware and software monitoring Securing enterprise perimeters to protect designed to help the compa- tools is integral for maintaining satisfaction as cus- from attacks is one thing, but doing that nies comply with regula- tomers interact with your SME’s online systems. and ensuring that company data and tions. procedures are compliant is another, far “One of the key chal- NEW PRODUCTS more challenging matter. lenges that companies face LaCie Two Big RAID........................................................16 Jason Bloomberg, a senior analyst is implementing the appro- SealedMedia Express For Board Communications ........17 with ZapThink, compares the process of priate governance,” Bloom- B&L Associates VaultLedger OnDemand........................18 staying in compliance with speeding berg says. “Governance is Blade Network Technologies HP GbE2c ........................20 on the highway but speeding less than basically coming up with an ASA Computers 1U Quad Servers ..................................20 the car in the other lane. “[Companies] approach to creating and figure that there’s no way they can stay Go to Page 10 Product Releases | 16 ■ The MT3 series of vertical 60A PDU from Aphel delivers power ranging between 5,000 and 10,000 are, after all, both located in the of access control, especially watts. ■ Aventail introduced the ST2 SSL VPN for same area—the two are distinct if both eyes are used. Frank controlling remote access to a network and support- from one another in what they Fitzsimmons, president and ing NAC initiatives. ■ BMC Software introduced The Eyes measure and especially in how CEO of iris recognition firm Data Center Optimization, which prevents data cen- intrusive they can be for those Iridian Technologies, notes that ter sprawl. ■ ContentWatch introduced two new being scanned. the chances of being mistaken products to its ContentProtect Professional Suite. ■ Iris recognition reads the pat- for someone else with a single Digi International’s new Digi Passport competes terns of, naturally, the iris, eye being scanned are about with traditional KVM over IP devices. ■ Para Have It which is the colored part of the one in a million. But if both Systems released four new additions to the Minute- eye that has enough unique eyes are scanned, the chance man line of UPS power distribution products. ■ As Iris Recognition Matures, SMEs attributes to distinguish one for error drops to one in a tril- SurfControl announced its SurfControl Enterprise person from another. The retina lion. Threat Shield 3.51 with features to prevent informa- May Be Drawn To Biometric Controls is in the back of the eye, where tion leakage via USB. ■ Watchfire’s AppScan and Clear-Eyed Winner the blood vessels come togeth- AppScan Developer Edition help businesses monitor by Elizabeth Millard An important distinction for er, and also has enough unique Although both iris and retina the security of online applications. ■ Websense and • • • this type of biometric is be- characteristics to be used for recognition have been used for CP Secure announced the CP Secure Content WHEN FACED WITH iris or reti- tween iris and retina recogni- identification. access control, the less intru- Security Gateway appliance and Websense Web na scans, the majority of peo- tion. Although people tend to Both forms of recognition sive iris systems soon began to Security Suite package. ple think of early spy or lump the two together—they are highly accurate in terms trump the retina scans. science fiction movies, with Digital camera readers take EACH WEEK a character looking into a a photo of the iris and compare Upcoming IT Events........3 Opinions ..................24, 25 sweeping red light that leaves it against a database, which MarketPlace News ..........3 Next Week ....................31 him blinking and uncomfort- Both iris and retina recognition allow the readers to be at least MarketWatch ..................4 What’s Happening ........31 able. But the reality is that 18 inches away from the per- are highly accurate in terms Product Releases..........16 Two Terms ....................31 eye-based recognition has son being scanned. Retina come a long way since the of access control, especially scanners, on the other hand, early days and could become tend to make people uncom- The Processor.com home page is updated each week with new articles and hardware news to help you keep current. more popular than even finger- fortable because of the light if both eyes are used. Visit www.processor.com today. print technology. Go to Page 10 Page 2 Processor.com July 28, 2006 For address change, fill out form below with new Subscribe Today / Address Change Form information and mail or fax. PLEASE PRINT Phone: ( ______ )________________________________ Fax: ( ______ )________________________________ © Copyright 2006 Sandhills Publishing Company. Contact Name: ______________________________________________________________________________ All rights reserved. Company Name: ____________________________________________________________________________ Address: __________________________________________________________________________________ City: ___________________________________________ State: ________ Postal Code: __________________ Subscriptions: (800) 819-9014 Subscriptions Local: (402) 479-2170 Country:____________________________________________________________________________________ Subscriptions Fax: (402) 479-2123 Email: ________________________________________ Web Address: ________________________________ Mail Form To: 1. What is the size of your company 3. What is your annual computer hardware/ P.O. Box 85518, Lincoln, NE 68501-5518 (how many employees)? software purchasing budget? Overnight Delivery: ■ ■ ■ ■ Less than 10 200 - 499 $0 - $9,999 $100,000 - $249,999 120 West Harvest Drive, Lincoln, NE 68521 ■ 10 - 99 ■ 500 - 999 ■ $10,000 - $24,999 ■ $250,000 - $499,999 ■ 100 - 199 ■ 1,000+ ■ $25,000 - $49,999 ■ $500,000 - $999,000 ■ $50,000 - $99,999 ■ $1,000,000+ 2. How often do you purchase computer hardware/software? ■ Weekly ■ Quarterly ■ Bi-weekly ■ Annually ■ Monthly ■ No Involvement www.processor.com Advertisers Index COMPANY PAGE COMPANY PAGE COMPANY PAGE COMPANY PAGE 360 TECHNOLOGIES . .41 CYBER SWITCHING . .15 MAIL FOUNDRY . .33 RECORTEC . .33 ABACUS SOLUTIONS LLC . .43 DATA CLEAN . .38 MARX CRYPTOTECH . .22 REGENT SALES INC . .42 ACCUSYS INC . .27 DATA RECOVERY SERVICES . .39 MARX SOFTWARE SECURITY . .38 ROSE ELECTRONICS . .23 ADDLOGIX (COMPUCABLE) . .37 DATA RELIANCE CORPORATION . .42 MEDIA MASTR MAGNETICS INC . .43 SANS DIGITAL . .25 ADVENTNET INC . .36 DATAMEDIA SOURCE . .43 MEDIA RECOVERY . .42 SANS DIGITAL . .28 ADVENTNET INC . .37 DIGITAL BROTHERS GROUP . .43