Click here to close now.

SYS-CON MEDIA Authors: AppDynamics Blog, Ian Goldsmith, Ed Featherston, Elizabeth White, Pat Romanski

News Feed Item

Intrinsic-ID to Showcase Device-Unique Cloud Security Solution at InfoSecurity Belgium

Saturnus Offers Proven Hardware Intrinsic Security and Two-Factor Authentication to Secure Data in the Cloud via PCs and Mobile Devices

EINDHOVEN, THE NETHERLANDS -- (Marketwired) -- 03/18/14 -- Intrinsic-ID, a leading provider of device-unique security solutions, will be showcasing Saturnus on the LSEC Booth (number 141) at InfoSecurity Belgium. Saturnus, launched in late 2013, is Intrinsic's combined software and hardware, device-unique solution to protect data in the cloud. Two-factor protection, using Intrinsic-ID's patented Hardware Intrinsic Security (HIS) technology, provides the highest level of security commercially available, as there is no need to trust a third party. Files are encrypted before they are uploaded to the cloud from a PC, tablet or mobile phone, with encryption keys generated and managed inside a USB token. Security is therefore anchored in hardware by means of private and local keys.

Intrinsic is offering a special Saturnus promotion for InfoSecurity attendees. Visitors are invited to try Saturnus for free by registering online and picking up a Saturnus token at the LSEC booth. InfoSecurity attendees can purchase Saturnus for a special price of 59,99 Euro (excl. VAT) for a three-year license. Normally, Saturnus can be ordered directly from the Intrinsic-ID website for 69,99 Euro (excl. VAT) for a one-year license.

Intrinsic-ID was invited to join LSEC (the Security Consortium of Leuven) at InfoSecurity Belgium because the organization relies on Saturnus and endorses its use. Ulrich Seldeslachts, chairman of LSEC, said, "Our day to day operations involve collaborating on different sensitive documents on an international basis, with various partners in different environments and on any timescale. Being constantly on the move, Saturnus provides us with the freedom to operate, to access and maintain documents without the costs or complexity of running our own security environment. On top, we can rely on all of the benefits of the cloud, without being concerned about eavesdropping, loss of confidentiality or overall data loss thanks to the underlying 'device-unique' Hardware Intrinsic Security (HIS) technology."

LSEC

LSEC is an internationally renowned information security cluster that was formed in 2002 to promote information security and related expertise. The non-profit organization is supported by the Flemish institute for sciences and development (IWT) and has a broad membership base of over 600 information security companies and more than 500 individual information security professionals.

Intrinsic-ID

Intrinsic-ID's data security and user authentication solutions seamlessly provide the highest level of commercially available security, in the most cost-effective way. Users gain total control over the protection of their digital assets. Whereas other options always include the need to trust a third party, Intrinsic-ID's 'device-unique' solutions are based on Hardware Intrinsic Security (HIS), a patented technology, proven and used by governments, that enables the extraction of unique identifiers from the innate characteristics of each semiconductor. 'Keys' are only generated when required and do not remain stored on the system. In addition to securing electronic data in the cloud and on other electronic systems, HIS can be used to prevent identity theft; counterfeiting and cloning of systems; piracy of media content and software apps; software reverse engineering and financial losses. Research was originated in Philips Electronics and the company is headquartered in the Netherlands, with sales offices in the USA and Asia. For further information see www.intrinsic-id.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Editorial Contacts:

USA:
Toni Sottak
Wired Island PR
(408) 876-4418
Email Contact

Europe:
Annette Bley
Annette Bley PR
+44 (0)20 7482 4800
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of present...
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to security professionals using bingo-laden terms like "moving security to the left" or "get a seat at the table." What we need are real-world examples and tactics for security practitioners to be part of DevOps. In his session at DevOps Summit, Andrew...
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
Every day we read jaw-dropping stats on the explosion of data. We allocate significant resources to harness and better understand it. We build businesses around it. But we’ve only just begun. For big payoffs in Big Data, CIOs are turning to cognitive computing. Cognitive computing’s ability to securely extract insights, understand natural language, and get smarter each time it’s used is the next, logical step for Big Data.
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developmen...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.