Monday, 24 August 2009
Exalead, European leader of search solutions and information access software in the enterprise and on the web, today announced that Yell has selected Exalead to host a new web search facility for its UK website Yell.com. The customised Exalead web search engine has been incorporated into the relaunched website to provide consumers with more detailed information about businesses and services.
Currently, Yell.com – part of international directories business Yell and one of the main sources of business leads in the UK - attracts 10 million unique visitors every month , and in 2008 it saw an increase in consumer usage of more than 40 per cent. Incorporating Exalead’s CloudView platform has enabled Yell to introduce more detailed and in-depth search-related advice and information content to complement consumers’ searches of Yell.com’s database of 2.3 million businesses and tradespeople.
“We wanted to enhance the search experience on Yell.com for our consumers by offering rich additional content and more detailed information before they choose a business or service,” explained Mark Canon, president of new media for Yell in the UK. “Exalead’s CloudView platform has enabled us to deliver these extra features and also provide an extremely comprehensive and intuitive search function. We were also pleased at the ease and speed of its deployment.”
The new search engine, which will be hosted 24/7 by Exalead, has been customised specifically for Yell.com and searches the web’s largest index after Google, Yahoo! and Microsoft, encompassing eight billion web pages, more than two billion images and four million videos. It is able to handle 180 queries per second, can extract content from external resources such as select websites or partner sites, and can also provide exclusive Wikipedia and advanced image searches. The search function is easily managed with generated results adhering to applied business rules.
Exalead’s CloudView is the leading platform for creating information applications that access structured and unstructured enterprise and Web information. With its innovative architecture, the CloudView platform provides core search solutions, which are feature rich and extremely easy to implement, thus providing a perfect combination of reduced administration costs and a better search experience for customers.
CloudView also enables online business to add instant depth and stickiness to their sites through innovative ‘mash-up’ applications - applications that merge content and functionality from diverse sources. Businesses, therefore, can benefit from enhanced online profiles via a larger, searchable section where consumers can see more detail, such as detailed descriptions of businesses and their products, photos, logos, maps, directions and videos, before selecting a business or service.
“We are extremely pleased that we have been able to help Yell develop and enhance its UK website in a short space of time,” explained Exalead Managing Director, Raymond Bentinck. “CloudView’s fully unified information platform enables Yell.com to provide seamless presentations that are as deeply engaging as they are easy to manage. As we are also hosting the customised search engine 24/7, we have removed the headache of managing searches so that Yell can concentrate on its core areas of business.”
Actimize, a leading provider of transactional risk management software for the financial services industry and a NICE Systems company, today warns banks and banking customers of a new attack vector – Man-in-the-Phone (MitP).
MitP blends new and old fraud techniques to trick banking customers into authorizing transactions via the phone channel. MitP builds on the successes realized from Man-in-the-Browser (MitB) attacks in which criminals use Trojans to infect a users’ Internet Browser to “modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application.” MitP also leverages ‘social engineering’, which in this case is the act of using trickery or deception during a phone conversation to convince an individual to divulge information.
In a typical MitP attack, a fraudster impersonates a bank representative and calls the banking customer to inform him/her that his/her savings, checking or card account may have been breached or compromised. The fraudster advises the customer that in order to remedy the situation he/she should remain on the line and verify a few account details. At the same time, the fraudster initiates a call to the customer’s bank and connects the customer with a real bank representative while the fraudster remains muted on the line. The bank requests authentication information, such as social security number, passwords and other personal information, which is then provided by the customer. Once the personal information is provided, the fraudster quickly ends the conference line and informs the customer that the issue has been resolved. Meanwhile, with the personal information gathered during the call, the fraudster can take over the customer’s phone banking relationship and transfer money out of the customer’s accounts.
For consumers - Actimize recommends that banking customers never share account or personal information with anyone that calls and requests to ‘verify’ banking credentials. Customers should always tell such callers that they will call the bank to provide such information using the bank’s phone number listed on the back of an ATM, debit or credit card. While this sounds obvious, many consumers do not take this simple precaution.
For Banks – Actimize recommends banks combine cross channel behavior profiling and anomaly detection technologies with better call center processes and training. Call center employees should be trained to listen more closely and ask who originated the call. Attacks may be thwarted or losses minimized if bank employees ask simple (but random instead of static) security questions at various points in the phone conversation when confirming personal credentials. Fraudsters are less likely to trick customers into sharing answers to several security questions.
“As consumers shift more financial transactions to secure online arenas, fraudsters have become more creative in utilizing traditional telephones,” said James Van Dyke, president and founder of Javelin Strategy & Research. “Access through mail and telephone transactions grew from 3 percent of ID theft in 2006 to 40 percent in 2007 and fraudsters are getting creative and leveraging new techniques to commit fraud, so consumers need to be as diligent as ever in protecting their personal information.”
“We help many of the largest retail banks, investment banks and brokerage firms protect themselves and their clients from all types of cross-channel fraud attacks,” says Paul Henninger, director of fraud solutions at Actimize. “With our unique perspective into the operations of financial institutions around the world, we can spot trends as they occur. We’ve noticed an accelerating trend in Man-in-the-Phone attacks. We hope that by publicizing this new trend, we can help reduce its impact on individuals and our banking clients.”
Actimize is uniquely positioned to detect contact center fraud attacks. The company provides real-time cross-channel fraud prevention for many of the world’s banks across phone, IVR, Web, mobile, ATM, Debit and other channels. Its parent company, NICE Systems is the industry-leading provider of recording, monitoring and analytics solutions for managing interactions, security and compliance at enterprises, contact centers, trading floors, branches and back offices.
NICE and Actimize offer the industry’s first integrated voice and transaction analytics cross-channel compliance solution that extracts insights from trading calls and transactions to boost trading surveillance and investigation, reduce risk and operational costs.
FutureSoft, Inc., developer of information security and connectivity solutions, today announced that the National Housing Federation has selected its Dynacomm PointGuard product to evolve its data security and handling capabilities, as well as protect its data from malicious web content inadvertently downloaded by employees.
“FutureSoft's PointGuard was chosen because it was not just a monitoring tool, but one that was flexible enough to be adapted to meet specific requirements, and was also secure,” explained Rob Green, Head of ICT, National Housing Federation. “The main security concerns were the introduction of viruses and malware into the infrastructure via USB ports. We had to control accessibility via the USB ports in PCs and laptops, as well as to prevent non-business related files being downloaded onto the networks.”
The National Housing Federation is the voice of affordable housing, representing 1,200 independent, not-for-profit housing associations in England. Its IT systems support a range of member service and research functions, enabling its core project and advocacy work. The Federation has around 150 employees spread between a head office in London and offices in Birmingham, Bristol, Leeds and Manchester. As a ‘third sector’, member funded organisation, it has to take an exemplary approach to its handling of potentially sensitive data and controlling costs.
The problems foreseen by the Federation were threefold, and will be recognisable to many of its members. The organisation, Green concluded, had to control what entered the system and what was backed up, what information was accessible and to whom, and to protect assets and staff from malicious content more effectively. Green was particularly glad to address both security and resource limitations with one, centralised application.
“Although our anti-virus software will pick up problems, this will only happen once a file has been opened. By using PointGuard we can prevent unknown files being introduced as well as any proliferation of non-business related files such as mp3 files,” said Green. “Also, as user needs change and new software is introduced, the PointGuard software needs to be flexible to meet these new requirements - and so far this is proving to be the case.”
FutureSoft’s Dynacomm PointGuard provides a central console to manage, monitor and secure access to applications, devices and data, within and without an organisation’s networks. Application and access control rules can be based on user, system, location, time, day and even media type. PointGuard allows network managers to control who is able to access certain files and applications, use removable media devices, as well as logging actions – even when a remote device is not connected to the network.
Prior to the implementation of PointGuard, the Federation would have had to regularly check for mp3, video and other file extensions that were not business related, and remove them from the external repository. Using PointGuard has meant these regular checks have reduced, although there are still occasions when files need to be saved. Furthermore, the Federation had recently migrated to a model of backing up its data in the cloud.
“Another issue we had to address was controlling our backups and archives more effectively - so that we weren’t backing up unwanted files and thus incurring unnecessary expense,” concluded Green. “Backups in the Federation are all off-site and paid according to the amount of data stored. If the files being backed up are not business related then costs could spiral.”
Tuesday, 18 August 2009
Aastra is expanding its A2P2 partner accreditation program with Extreme Networks to deliver fully integrated Unified Communications solutions with Aastra’s telephone systems
Aastra, a company at the forefront of open-standards enterprise communications, today announced that Extreme Networks has become a qualified member of its Aastra Approved Partner Program known as A2P2.
For further information and interviews, please contact firstname.lastname@example.org
Monday, 17 August 2009
Capscan (www.capscan.com), a leading supplier of UK and international address management solutions and data integrity services, has announced that its ‘nearest’ look-up tool, Nearcode, has been implemented by its partner magneticNorth (mN) on the Kellogg’s & Swimming homepage (www.kelloggs.co.uk/whatson/swimming). Using Nearcode, visitors to the newly launched microsite can find the closest swimming baths to any postcode or city, as part of Kellogg’s ongoing campaign to raise awareness of the benefits of regular exercise through swimming.
For further information, or interviews, please contact email@example.com
Tuesday, 11 August 2009
The transaction transfers ownership of the Soapstone Networks software control plane and service aware provisioning system to Extreme Networks®, enabling Extreme Networks to simplify the service provider’s job of provisioning and maintaining Ethernet services for their subscribers.
“The addition of the software assets from Soapstone Networks into the Extreme Networks intellectual property portfolio continues our commitment to carrier Ethernet,” said Extreme Networks Vice President & General Manager for the Software Business Unit, Glenn Weinberg. "The unique provisioning and service aware capabilities of the Soapstone Networks software will enable Extreme Networks to deliver a more complete, extensible solution to carrier Ethernet service providers.”
The Soapstone Networks software will be integrated into the Extreme Networks EPICenter® Network Management System, providing a service level view, provisioning and management of carrier Ethernet networks and protocols including Provider Bridging (PB), Provider Backbone Bridging (PBB), Provider Backbone Bridging with Traffic Engineering (PBB-TE), Ethernet Access Protection Switching (EAPS) and Virtual Private Line (VPLS).
For more information on Extreme Networks metro Ethernet transport solutions, please visit: http://www.extremenetworks.com/.
Monday, 3 August 2009
NanoEntrepreneurs Focus Group Looks at Commercial Opportunities for Nanotechnology in the South
8th September 2009 at the Millbrook Technology Campus, Southampton
NanoKTN and South East Business Innovation & Growth Host Event to Support and Encourage Micro- & Nanotechnology Commercialisation
Since re-launching its Channel Programme in 2007, Extreme Networks has invested heavily in its channel partner programme. The series of seminars and other initiatives planned in partnership with Westcon have been designed to provide partners with the tools they need to capitalise on current market demands for high-end networking solutions.
Customer demands have changed drastically over the last twelve months, with nearly all end users looking to do more with fewer resources. With businesses trying to reduce costs associated with IT spending and looking for the best available reliability and Total Cost of Ownership, it is imperative that the solutions on offer meet the needs of 21st Century users. With this in mind, the channel must have the support of a leading vendor who is capable of supporting its pre- and post- sales activities.
Specific details and entitlements for the Limited Lifetime Warranty are located at: http://www.extremenetworks.com/services/warranty.aspx