Companies Launch Security Initiative

Enterasys Networks and Vynamic have teamed to offer an e-learning security solution to protect faculty and institutional intellectual property, providing a secure environment for research and academic records. With increasing numbers of higher education institutions and numerous enterprise companies offering online courses to students and staff, security has become a major concern in the e-learning market. The companies have joined to solve the problems by engineering solutions that assure only registered students and users can obtain access to the network and to proprietary information.

Vynamic provides several levels of security for e-learning and Digital Rights Management (DRM). Once a user is inside an education system protected by Vynamic, the system attaches an identifying digital certificate to the user's browser. This digital certificate helps authenticate the user as an authorized user, not someone who has pirated the password of a colleague. To properly authenticate users, Vynamic offers software and hardware solutions for high-level security needs. The latter can include biometric thumb print readers or retina scanning devices attached to the PC for highly secure environments, or simply include users' details such as account or social security numbers and passwords. Enterasys Networks, Rochester, NH, (603) 332-9400, www.enterasys.com.Enterasys Networks and Vynamic have teamed to offer an e-learning security solution to protect faculty and institutional intellectual property, providing a secure environment for research and academic records. With increasing numbers of higher education institutions and numerous enterprise companies offering online courses to students and staff, security has become a major concern in the e-learning market. The companies have joined to solve the problems by engineering solutions that assure only registered students and users can obtain access to the network and to proprietary information.

Vynamic provides several levels of security for e-learning and Digital Rights Management (DRM). Once a user is inside an education system protected by Vynamic, the system attaches an identifying digital certificate to the user's browser. This digital certificate helps authenticate the user as an authorized user, not someone who has pirated the password of a colleague. To properly authenticate users, Vynamic offers software and hardware solutions for high-level security needs. The latter can include biometric thumb print readers or retina scanning devices attached to the PC for highly secure environments, or simply include users' details such as account or social security numbers and passwords. Enterasys Networks, Rochester, NH, (603) 332-9400, www.enterasys.com.

Featured

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    Cloud Security Auditing Tool Uses AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has unveiled a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • laptop with a neural network image, surrounded by books, notebooks, a magnifying glass, a pencil cup, and a desk lamp

    D2L Updates Lumi with Personalized Study Supports

    Learning platform D2L has introduced new artificial intelligence features for D2L Lumi that help provide more personalized study supports for students.

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.