TITLE

PowerIT buys an IT security services arm

PUB. DATE
October 2003
SOURCE
IT Training;Oct2003, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
PowerIT, a training and services specialist to the networking and telecommunications markets, has bought the IT security consultancy and services business of Chimaera Network Security for an undisclosed sum. Simon Andrews, chief executive of PowerIT, claims the move enables it to provide a much wider product offering. "We've been very training orientated," he explains,' but this will give us much greater scope, particularly in the security field. Andrews adds that the decision to diversify was not a reaction to a downturn in the market: "All our key partners have products that impact on the security sector, so an extension of our skills in this area makes obvious sense."
ACCESSION #
11095199

 

Related Articles

  • Automated Patching: An Easier Approach to Managing Network Security. Schultze, Eric // Database & Network Journal;Apr2005, Vol. 35 Issue 2, p15 

    Highlights the benefits of automated patching, a tool that organizations can use for the management of network security.

  • Ten Tips to Protect Customers from Identity Theft.  // Database & Network Journal;Apr2005, Vol. 35 Issue 2, p20 

    Offers tips for corporate information technology managers and Security Officers to protect customer information from identity theft.

  • The enemy within. Liebmann, Lenny // Communications News;Mar2001, Vol. 38 Issue 3, p102 

    Gives advice on ensuring computer security. Importance of implementing change-management practices to reduce internally caused problems; Factors to consider in information technology management; Role of network managers in implementing computing practices.

  • WHO DO YOU TRUST?  // Electronic Design;12/8/2004, Vol. 52 Issue 27, p58 

    The article informs that secure communication comes down to a matter of trust. An authenticated message from an authenticated source can be used accordingly based upon the confidence level of the source. A source trusted to provide embedded-system updates can send new program code while an...

  • A New Modulation for Intrinsically Secure Radio Channel in Wireless Systems. Mucchi, Lorenzo; Ronga, Luca; Cipriani, Leonardo // Wireless Personal Communications;Nov2009, Vol. 51 Issue 1, p67 

    Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common knowledge between source and destination. A shared secret...

  • The critical need for IPTV security. Kolon, Matt // Telecom Asia;Oct2007 Supplement, Vol. 18, p12 

    The author reflects on the importance of network security in protecting Internet Protocol Television (IPTV) and IPTV content delivery network against hackers and other threats. He cites the application of new security approach that safeguard the system despite of its structural differences. He...

  • Securing Your Satellite Network and its Contents. Berlocher, Greg // VIA Satellite;10/1/2009, Vol. 24 Issue 10, p6 

    The article focuses on the concept of network security as a means of protecting a network and its content from threats. It is stated that earlier satellite networks were not interconnected with the outside world and so were believed to be secure. However, with the use of Internet, the...

  • Multi-Layer Data Encryption Using Residue Number System in DNA Sequence. Youssef, M. I.; Emam, A.; Abd Elghany, M. // International Journal of Security & Its Applications;Oct2012, Vol. 6 Issue 4, p1 

    In this paper, we will merge between the usages of DNA sequences and Residue number system in encryption systems. The message which is coded will be secretly impeded inside the DNA sequence. This merge will be leaded to perform multilayer encryption with different keys - that can be used as a...

  • Take the leap to a wireless future. Tullett, Jon // SC Magazine: For IT Security Professionals;May2004, p30 

    This article explains how wireless security standards are being left behind, but why the effort required to understand and use them properly will cut costs, improve productivity and help organizations grow. The security provisions in wireless networks have lagged since the inception of wireless...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics