Business Security: IT security trends at CeBIT 2015

by | Mar 2, 2015

– Developers, manufacturers and distributors showcase their innovations
– Perfect overview for CIOs, IT professionals and decision-makers

DruckHannover, Germany. The German Federal Office for Information Security (BSI) registers a new malware every two seconds. Loss of data is one of the biggest business risks for companies of all sizes. Corporate espionage in particular can be an existential threat for many companies, and the protection of critical infrastructures, for example for energy suppliers, is even more indispensable.

What techniques do hackers and cyber spies use, and how can businesses protect their technical infrastructure and intellectual property from attack? IT security experts and IT security solution suppliers will answer these crucial questions at CeBIT 2015, from 16–20 March. The first point of access is the CeBIT Business Security area in Hall 6, but the IT security theme plays an important role in other focus areas of the fair as well.

Trend Micro: Secure office in the Cloud (Hall 6, B16)
New security products for Microsoft Cloud solutions (Office 365) are the focus of Trend Micro, which lets users protect their data onsite and on the Web with encryption and anti-malware. Trend Micro is also continuing its “Global Security Breakfast” series to inform companies of how to protect themselves from targeted attacks, and what role legal standards such as the EU Data Protection Directive play.

DIGITTRADE: Hard drive with a virtual lock (Hall 6/L10)
Sensitive information can fall into the wrong hands during data transport, causing irreparable damage. DIGITTRADE is exhibiting the latest version of its high security external hard drive with AES encryption, two-factor authentication and a high-speed USB 3.0 interface – the only hard drive authorized in Europe for storage of personal data by administrative authorities. The tap-proof smartphone app Chiffry is also on show in Hannover, available in Android, iPhone and BlackBerry versions – including new premium features such as bug-proof group chatting with up to 50 participants.

ESET: Protection for Windows, Mac and Android (Hall 6/B18)
The fact that an ever greater number of devices are connected to the Internet raises the threat potential for many sectors. Slovak software publisher ESET is presenting new products for business users with the Windows, Mac OS X and Android operating systems at CeBIT. The new ESET Remote Administrator console runs under Linux and significantly reduces the time needed for daily IT security management. Reports and other data can be called up directly from the system.

Gateprotect: Next Generation Firewalls (Hall 6/B16)
Unified threat management solutions and high-performance enterprise firewalls that are developed and tested in Germany offer stable, user-friendly protection for corporate networks and reduce the risk of operator error. According to the manufacturer, Next Generation Firewalls is currently the only product that supports the IEC-60870-5-104 protocol used for communication between remote points and guidance systems in the German energy sector.

Rohde & Schwarz SIT: Encryption headset for mobiles (Hall 6/K24)
Unprotected phone calls present a considerable risk for companies. Rohde & Schwarz SIT is demonstrating the TopSec Mobile encryption headset for speech encryption with conventional smartphones at CeBIT. The TopSec Office Gateway supports encrypted phoning on the go with in-house landlines. The company is exhibiting the Next Generation Firewall R&S SITGate for new smart energy grids. The highlight is the smart grid protocol decoder, which ensures that power generators send measurements and status information, but no commands or malicious codes to other grid elements.

itWatch: Introduction to cybersecurity (Hall 6/E16)
RiskWatch by itWatch is an easy-to-use, entry-level cybersecurity product, preparing an individual overview of company IT at the push of a button and recognizing security threats in real time. This self-replicating technology for automatic identification of IT risks on Microsoft clients and servers is CPU and data-centered.

Kaspersky Lab: Protective screen with flexible technology (Hall 6/B16)
Kaspersky Lab is presenting a wide range of security solutions and service offers for companies at CeBIT, including a tailored solution to protect data centers from DDoS (Distributed Denial of Service) attacks. Kaspersky DDoS Protection protects companies with a flexible grid infrastructure that runs through data centers inside the European Union. The system identifies pending DDoS attacks and can stop them before they have serious consequences for corporate functions.

Sophos: When the firewall speaks (Hall 6/D18)
These days business networks include a plethora of different devices that are used everywhere. While attackers are making use of this new development, end-point security technologies often lag behind. Sophos is closing the gap with its Next Generation Enduser Protection, which integrates innovative end-point, mobile and encryption technologies. When the system recognizes an attack, the administrator is notified and access to sensitive network and cloud data is automatically blocked.

8MAN: Bridge between SAP and Microsoft (Hall 6/E27)
Protected Networks is exhibiting its 8MAN for SAP at CeBIT, as an extension of existing basic technology. This innovative product makes access rights for different digital data universes graphically visible for the first time. In an environment where companies that work with both SAP and Microsoft generally struggle to manage both data universes with equal reliability and security, this solution enables convenient cross-system access rights management.

digitronic: Smart protection for mobile devices (Hall 6, B16)
It is unthinkable these days to exclude personal smartphones, tablets and notebooks from being used for work. There are significant threats in enabling access to corporate IT infrastructure via these mobile devices, because personal machines generally do not integrate the same security standards. The MyCapp app by digitronic is a platform-independent and cross-vendor container solution that enables various applications to be run in a secure environment.

Secusmart: Encryption for mobile devices (Hall 6/J16)
Secusmart and Vodafone are introducing the latest version of their Secure Call high-security encryption app at CeBIT. This app for the Android, iOS and Windows Phone smartphone operating systems aims to let corporations and small businesses, along with politicians and public officials, enjoy wiretap-protected mobile phone calls. The developers are using SecuSUITE For BlackBerry 10, which protects the “Chancellor phone” used by the German federal government, to ensure the highest security standards for speech encryption.

LANCOM: All you need for full IP conversion (Hall 13/C28)
In alignment with the CeBIT d!conomy theme, LANCOM is presenting solutions for successful digitization at its exhibition stand. The focus is on secure routers, the full IP conversion of the major telecom providers, and the unique global integration of electronic displays in WLAN infrastructures. CeBIT visitors will discover a comprehensive portfolio of network solutions that are developed and produced under Germany’s highest security standards.

Secucloud: Security from the Cloud (Hall 16/D30)
One of the finalists in the CODE_n 15 CONTEST is German startup secucloud. The company’s Cloud-based IT security system filters the entire data flow of mobile devices – across operating systems and without needing to install software or an app, depending on the provider. Similar solutions are available for Industry 4.0 and smart-home concepts.

Share This Article!

Brian Pereira
Brian Pereira
Brian Pereira is an Indian journalist and editor based in Mumbai. He founded Digital Creed in 2015. A technology buff, former computer instructor, and software developer, Brian has 29 years of journalism experience (since 1994). Brian is the former Editor of CHIP India, InformationWeek India and CISO Mag. He has served India's leading newspaper groups: The Times of India and The Indian Express. Presently, he serves the Information Security Media Group, as Sr. Director, Editorial. You'll find his most current work on CIO Inc. During his career he wrote (and continues to write) 5000+ technology articles. He conducted more than 450 industry interviews. Brian writes on aviation, drones, cybersecurity, tech startups, cloud, data center, AI/ML/Gen AI, IoT, Blockchain etc. He achieved certifications from the EC-Council (Certified Secure Computer User) and from IBM (Basics of Cloud Computing). Apart from those, he has successfully completed many courses on Content Marketing and Business Writing. He recently achieved a Certificate in Cybersecurity (CC) from the international certification body ISC2. Follow Brian on Twitter (@creed_digital) and LinkedIn. Email Brian at: [email protected]
Recommended Posts
Why Landing On The Moon Is Difficult

Landing an uncrewed vehicle on the surface of the moon or any planet is not easy; space institutions have made multiple attempts after seeing their spacecraft crash on the surface.

Similar Articles

Share This