June 01, 2012 With all of the talk around cloud and mobile, the real killer app for security may very well be identity and access control. There are some great open source solutions around access control, but at the enterprise level more functionality and scale are needed. Fox Technologies has developed that kind of application. … Read more

May 12, 2012 A recent study made by TechAmerica reveals the challenges federal IT executives are confronted with on a daily bases and the figures show that internal and external data breaches are a top concern, along with the limitations posed by budgets. “Cybercrime is a 24/7 industry and in many cases the criminals are … Read more

April 19th, 2012 A 31-year-old Russian has been charged by US authorities on suspicion of running a scheme that involved breaching retail brokerage accounts and sham trades. The illegal activities caused damages of around $1 million (700,000 EUR). Lynne Courts, CMO of FoxT, an access management software provider, said: In this case, it seems as … Read more

April 11, 2012 The data breach that recently affected Global Payments caused a lot of concerns, especially after it came to light that around 1.5 million cardholders might have been impacted. Since some voices claimed that an unprotected administrative account might have been the source of the incident, we decided to ask for an objective … Read more

CIO March 15, 2012 A large number of enterprises have not implemented automated server access controls, exposing themselves to risks ranging from insider fraud and corporate espionage to regulatory compliance issues and even nation-state sponsored attacks, according to a recent report by information security research firm Echelon One and enterprise access management specialist Fox Technologies. … Read more

Accessing Cloud Resources Making the Cloud Meaningful to End Users Getting to data should be done securely and seamlessly, whether on corporate servers or in the cloud, says Fox Technology Chief Technology Officer Tommy Magnusson. Read more   BankInfoSecurity is a multi-media website published by Information Security Media Group, Corp. (ISMG), a company specializing in … Read more

February 27th, 2012 | Posted by admin in Uncategorized - (0 Comments)

February 27, 2012 ServerControl included in NetworkWorld New Products of the Week Slideshow. Product name: ServerControl 6.6.2 Key features: FoxT ServerControl 6.6.2 adds Active Directory bridging capabilities for integration of access controls for Unix, Linux and Windows server environments where the primary user repository is Microsoft Active Directory. More info.           … Read more

Feb 4, 2012 “Enterprises often focus on the network perimeter and follow compliance requirements without really protecting the data, said Subhash Tantry, CEO of FoxT. Assuming the network has already been breached, measures such as fine-grained authorization, policy enforcement and contextual authentication would ensure only the users who are supposed to have access to the … Read more

Feb 2, 2012 VeriSign, the company responsible for guiding most of the world’s Internet users to the correct websites and once the largest encryption certificate issuing authority, has acknowledged that it was successfully hacked several times in 2010. The admission was disclosed last fall in a VeriSign filing with the U.S. Securities and Exchange Commission … Read more

January 24, 2012 Episode 245  of  The CyberJungle is about 27 minutes long.  You can hear it by clicking on the flash player below. The interview with Mr. Tantry CEO of FoxTechnology on server protection after the Zappos Breach starts at about 15min. You may download the file directly – great for listening on many smartphones. Or, … Read more