Recently I visited Singapore for RSA Conference APJ, which involved passing through immigration and customs. I realized – perhaps as a byproduct of jet lag – that border control is in many ways an identity management issue.
Like Information Security teams, border control needs to prevent unknown entry, validate who is entering (via authentication), and have visibility and control of what people are authorized to do while in the country (i.e. – Are you a short-term tourist? Are you permitted to work here?). This has gotten more difficult for border control teams as the volume and type of visitors has increased, as has pressure to ensure security. New high-tech immigration kiosks have been brought in to automate some of this by scanning passports and photographing lower-risk individuals so that the staff can focus on the more complex work that needs their attention.
AllSouth Federal Credit Union serves more than 95,000 members worldwide and has more than $690 million in assets. We’re committed to a “people helping people” philosophy. Simply put, we deliver on the promise by helping our members meet their financial goals. 50% of American adults report that having enough money for retirement is their number one financial goal, while 63% cite the inability to save enough as an obstacle to achieving financial goals.
When I first took on the role of Vice President of IT Services, I knew we had to craft an IT solution that would ultimately help our members meet their financial goals. Our members are mobile and require access to their accounts wherever they are. As such, we offer online banking, a mobile app and even text message banking — all with the goal of making it easier for our members to manage their finances.
As the traditional workplace evolves, enterprises must continue to rethink how best to support its growing mobile workforce without losing productivity, efficiency and control.
Today, EMC Syncplicity launched its all-new iPhone app, available now in the iPhone App store. Its beautiful user experience is built on the foundation of cutting edge consumer apps with added innovations to make complex tasks easy by overcoming the constraints of using a smaller form factor (i.e. a mobile device).
Kangwon Land is a casino resort in the province of Gangwon-do in Korea. They’re unique among the 17 casinos in the country in that they’re the only one where Korean citizens are allowed by law to play. They’re more than a casino: as Jun-Ho Jeon describes it: “We’re a five-star resort with golf, skiing and other recreational activities. Kangwon Land is focused on ensuring that everyone enjoys themselves and has a world-class experience.”
Kangwon Land is also focused on ensuring that they meet industry regulations. This includes video surveillance of every table in use. Their video surveillance infrastructure is large, complete with 1400 high-definition and 300 standard-definition cameras in constant operation. It’s believed that this is the largest centralized IP video surveillance environment in Asia.
Increasingly, organizations are relying on web and mobile channels to communicate and engage with customers and partners. So often we focus our security efforts on the internal infrastructure, we forget that web portals and mobile applications offer an easy way into enterprises. Many consumer-facing websites are targeted as the first step to a broader attack on an enterprise. Many of us are leaving that door wide open.
Today RSA launched the next generation of RSA Web Threat Detection, which is designed to help organizations shore-up that front door by providing enhanced visibility into what’s occurring across the website and the mobile channel. The sheer amount of traffic seen across a website can be overwhelming. Security and fraud teams need insight into these sessions at each step: when an end user begins their session, through login, transactions – and everywhere in between. Criminals try to hide among the noise of the general population’s traffic looking for holes in the business logic of the web application, attempting fraudulent transactions, probing for vulnerabilities or injecting malicious code.