TITLE

OMLIS AND IBM DEBUT ENTERPRISE SECURITY TECHNOLOGY

PUB. DATE
September 2015
SOURCE
Audiotex Update;Sep2015, Vol. 27 Issue 9, Special section p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Product Review
ABSTRACT
The article discusses the launch of the Secure Enterprise Messenger (SEM) encryption technology from International Business Machine (IBM) and Omlis.
ACCESSION #
109235891

 

Related Articles

  • OMLIS AND IBM DEBUT ENTERPRISE SECURITY TECHNOLOGY.  // Computer Security Update;Sep2015, Vol. 16 Issue 9, p4 

    The article reports on the launch of the encryption technology Secure Enterprise Messenger (SEM) by software company Omlis with computer hardware company International Business Machines Corp. (IBM). Topics include the acquisition of cloud computing provider Softlayer by IBM, the assurance of the...

  • IBM boosts encryption initiative. Moeller, Michael; Leach, Norvin // PC Week;9/16/96, Vol. 13 Issue 37, p1 

    Reports on plans by International Business Machines (IBM) to begin rolling out several security initiatives in September 1996. SuperCrypto, an umbrella strategy that attempts to categorize encryption schemes into four areas; Key recovery technologies that will also be part of the rollouts;...

  • IBM to deliver framework for secure transactions. Moeller, Michael; Kerstetter, Jim // PC Week;11/18/96, Vol. 13 Issue 46, p6 

    Announces advances made in secure Internet commerce made by International Business Machines (IBM) in November 1996. Details of the encryption code dubbed PQR; How it will leverage IBM's Cryptolopes; The intention of releasing other services and applications for electronic commerce; Details of...

  • IBM claims encryption breakthrough.  // Electronic News;05/12/97, Vol. 43 Issue 2167, p54 

    Reports on International Business Machines' announcement of making an encryption breakthrough during the 1997 Association of Computing Machinery Symposium on Theory of Computing in El Paso, Texas.

  • And in the interests of balance….  // Image Technology;Sep1998, Vol. 80 Issue 8, p27 

    The article reports that the International Business Machines Corp and NEC Corp. have agreed on a digital watermark system standard which could aid safeguard the copyright of DVDs. The companies intend to combine their technologies and offer them as a single standard to the international...

  • IBM to expand into the information protection market.  // MarketWatch: Technology;Jul2008, Vol. 7 Issue 7, p17 

    The article focuses on the initiatives taken by International Business Machines Corp. (IBM) towards its plan to enhance its capabilities in the information protection market. The company announces its plan to release an enterprise encryption key management solution and a data classification and...

  • PULSEpartum: Last Words From IBM's Service Management Event.  // Channel Insider;2/25/2010, p1 

    Information about the topics discussed at the International Business Machines Corp. (IBM) Pulse 2010 conference held in Las Vegas, Nevada is presented. Topics include asset management, data encryption and the role of service management in the storage segment. The conference featured several...

  • IBM bulletin to monitor internet risk. Saran, Cliff // Computer Weekly;11/2/2004, p5 

    This article presents information related to the Internet security bulletin started by International Business Machines Corp. (IBM). IBM is to introduce a monthly security bulletin to inform users and service providers about attacks on the critical infrastructure of the Internet. The IBM Global...

  • IBM encryption scheme holds significant promise. Golden, Ed // InfoWorld;5/12/97, Vol. 19 Issue 19, p21 

    Details an encryption scheme developed by Miklos Ajtai and Cynthia Dwork, researchers at International Business Machines, which can be used to form the basis of unbreakable public-key encryption for computer-security systems. Lattice problem as the basis of the scheme; Company's remarks on the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics