15.02.2005 20:03:00

Phoenix Unveils Built-In Device Security Innovations At RSA 2005 Confe

Phoenix Unveils Built-In Device Security Innovations At RSA 2005 Conference


    Business Editors/High-Tech Writers
    RSA Conference 2005

    MILPITAS, Calif.--(BUSINESS WIRE)--Feb. 15, 2005--

    Momentum Grows for Phoenix TrustConnector Device Authentication
    and Recovery Software, Allows Devices to be Secure From the Start

    Phoenix Technologies Ltd. (Nasdaq:PTEC) today announced a new initiative and new solutions and resources that help users and builders of connected digital devices safeguard both the devices, and the critical user data housed on them. Today's announcements were made at the start of the RSA Conference 2005, the largest event for information security professionals, which is being held February 14-18 in San Francisco. Announcements include:

-- Phoenix has joined Cisco Systems and other industry leaders in the Network Admission Control (NAC) initiative, which focuses on improving protection of networked enterprise data by denying access from untrusted devices. By incorporating device identification, Phoenix makes it simple and transparent for a user to get on the network. This model is similar to how a cell phone authenticates to a network. When a cell phone user turns on the device, the phone automatically authenticates itself to the cellular network activating specific user permissions and privileges specified in the user profile. Similarly, with Phoenix TrustConnector, the digital device automatically authenticates itself to the data network. By deploying NAC compliant products including Phoenix TrustConnector, customers can allow network access only to compliant and trusted endpoint devices and restrict access of non-compliant devices.

-- Phoenix is delivering the TrustConnector Security SDK, which application developers can use to protect their software against piracy.

-- The company has added capabilities in its Phoenix Core System Software to support Absolute Software's Computrace Computer Theft Recovery and Secure Asset Tracking(TM) software that locates and recovers stolen computers, remotely deletes sensitive data, performs inventory and lease tracking and aids organizations with regulatory compliance.

    Phoenix, which has been an innovator of advanced, built-in software technologies for PCs and other digital devices for nearly 25 years, will demonstrate how that innovation can be applied to today's cyberthreats with its advanced security software. The Phoenix security framework is gaining momentum among system integrators for its ability to authenticate devices connected to networks and improve security of certificate-based Windows applications. Visitors to Phoenix's booth #440 at the RSA Conference this week can see demonstrations of Phoenix' security innovations in action:

    -- How TrustConnector protects access to data and networks by
    binding certificate credentials to the device

    -- How the Phoenix Security SDK protects media files from piracy
    by incorporating itself into end user applications and locking
    data files so that they can only be used on one device by that
    application.

    -- How Phoenix recovery applications restore a system after a
    virus or spyware attack.

    Finally, more details on the security issues surrounding networked systems and Phoenix's approach to enabling devices are presented in three new white papers, now available from the Phoenix web site at www.phoenix.com.
    The papers include: "Trusted Devices Enable Trusted Networks," with perspectives from Phoenix Chairman, President and CEO Albert E. Sisto; "Device-level Security for a Trusted Corporate Network," which provides detailed analysis of the benefits of device level security, such as the ability to keep untrusted personal devices off of the network, making digital certificates theft proof, enabling truly secure VPN access, and ultimately saving money while protecting digital assets. "Closing the Disaster Recovery Gap in Government IT" gives government IT professionals information on recovery solutions that provide capabilities for instant-on system and data restoration.
    "Computer networks are at the core of everyday life, but a network is only as secure as the devices that connect to it," said Michael D. Goldgof, Senior Vice President and General Manager of the Corporate Marketing and Product Divisions for Phoenix Technologies. "Phoenix deploys our unique experience, knowledge and technology to safeguard the digital devices people rely on everyday in the home, at the workplace, and in industrial applications."

    About Phoenix Technologies

    Phoenix Technologies develops a complete product suite of Core System Software, tools and applications to deliver trusted, seamless computing to digital devices for an Internet-connected world. Phoenix Technologies helped launch the PC industry nearly 25 years ago. Today the company is extending its leadership and knowledge at the core of machines, beyond the PC to a wide range of platforms and devices.
    Phoenix Core System Software has set the standard for the world's leading branded PC OEMs and their global network of supply chain and software partners. Today, Phoenix solutions enable, secure, connect, and recover the world's best-known systems. These solutions are built into the device core, where they are protected from viruses, user errors, hackers, and corruption. Phoenix is headquartered in Milpitas, Calif. (Silicon Valley), with offices in global business and technology centers. For more information, visit www.phoenix.com.

    Phoenix, Phoenix Technologies and the Phoenix Technologies logo, and TrustConnector are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other trademarks are the property of their respective owners.

--30--AM/sf*

CONTACT: The Hoffman Agency Carolyn Robinson, 408-975-3065 crobinson@hoffman.com

KEYWORD: CALIFORNIA INDUSTRY KEYWORD: HARDWARE COMPUTERS/ELECTRONICS SOFTWARE NETWORKING TRADESHOW PRODUCT SOURCE: Phoenix Technologies

Copyright Business Wire 2005

JETZT DEVISEN-CFDS MIT BIS ZU HEBEL 30 HANDELN
Handeln Sie Devisen-CFDs mit kleinen Spreads. Mit nur 100 € können Sie mit der Wirkung von 3.000 Euro Kapital handeln.
82% der Kleinanlegerkonten verlieren Geld beim CFD-Handel mit diesem Anbieter. Sie sollten überlegen, ob Sie es sich leisten können, das hohe Risiko einzugehen, Ihr Geld zu verlieren.

Nachrichten zu Phoenix Technologies Ltd.mehr Nachrichten

Keine Nachrichten verfügbar.

Analysen zu Phoenix Technologies Ltd.mehr Analysen

Eintrag hinzufügen
Hinweis: Sie möchten dieses Wertpapier günstig handeln? Sparen Sie sich unnötige Gebühren! Bei finanzen.net Brokerage handeln Sie Ihre Wertpapiere für nur 5 Euro Orderprovision* pro Trade? Hier informieren!
Es ist ein Fehler aufgetreten!

Indizes in diesem Artikel

S&P 600 SmallCap 935,46 -0,94%