In July 2020, IGEL launched its IGEL Ready Program. IGEL is the world's leading provider of next-gen edge OS solutions for secure cloud workspace deployment. Its innovative software products include the IGEL OS™ operating system, the IGEL UD Pocket™, and the Universal Management Suite™ (UMS). With this portfolio, IGEL creates a more secure, intelligent, and cost-effective endpoint management and control platform for virtually any x86-based device. As part of the IGEL Ready Initiative, IGEL has now opened up its operating system to any technology partner who wants to integrate and validate their products to work with IGEL OS. For CHERRY, participation in the IGEL Ready Program is a great opportunity to offer its own products to an ever-growing market and create an increased presence to its customers. In addition, CHERRY is taking the opportunity to create basic compatibility of its products with IGEL so that no subsequent adjustments are required on the customer side. CHERRY thus makes it possible for its products to interact securely and smoothly with IGEL - just as users are accustomed to, simply according to the principle of plug & play.
According to Verizon's "2019 Data Breach Investigations Report," 36% of data breaches are committed by insiders. Insiders are responsible for 54% of incidents in the healthcare industry and 34% in the public sector. The most recent prominent example is Twitter. Unknown persons have hacked numerous Twitter accounts of celebrities. Via the Twitter profiles of former U.S. president Barack Obama, presidential candidate Joe Biden and Amazon boss Jeff Bezos and many others, the hackers spread advertising for dubious crypto-currency deals. Accounts of companies like Apple and Uber were also affected. The magazine "Vice" reported shortly after the incident that a Twitter insider was responsible for the hack. With the SECURE BOARD 1.0, CHERRY has a solution in its portfolio that effectively tackles problems such as the one suspected here from the hardware side.
Smart card terminals are usually called smart card readers or chip card readers in the desktop environment. The expression is somewhat misleading because the "reader" does not read anything itself. It only forwards the APDUs (Application Protocol Data Units) between the card and the host. It does not matter whether it is a read or write command, for example. Today, it is impossible to imagine access control to sensitive areas without smart cards.
CHERRY enters the race with its SmartTerminal with USB connection supports for protecting sensitive data in a straight-forward and reliable way. The terminal lives up to its name and is undoubtedly smart: it is stable and can be operated with one hand thanks to its weight, making it extremely easy to use. It reads and writes chip cards with extremely low power consumption. Whether access controls, network logon, or chip card-based internet transactions - the SmartTerminal ST-1144 makes a valuable contribution to protecting sensitive data. The reader is a real all-rounder - considering compatibility is very important: it starts with the chip card types. The SmartTerminal ST-1144 reads and writes all ISO 7816 cards and is compatible with USB 2.0, the software interfaces CCID, PC / SC, CAC, and the OmniKey 3121 (Aviator).
Entering the world of zeros and ones<p>It has always been of immense importance to people to have control over who they have access to, and who they do not. Long ago, defensive measures such as a moat and a drawbridge provided protection against unwarranted outside attacks. Solid city walls, along with gates locked in the evenings, allowed for feelings of safety and security. However, in today's digital age, things are much different. </p><p>In addition to controlling the purely physical access to buildings or sensitive areas within them, there is also access control into the digital world of zeros and ones. An intelligent method of authenticating those who want to enter - be it in a building or a computer - along with many other options such as passwords, number codes or biometric authentication methods - is the smart card.</p>
“Bouncers” for sensitive areas<p> Authorities in the broadest sense and government institutions, in particular, are undoubtedly the most sensitive buildings and institutions that regulate very precisely who has access to which areas. In the Department of Defense (DoD), for example, the Common Access Card (CAC) controls the standard authentication for the personnel of the uniformed service in active duty, the selected reserve, the civilian employees of the Ministry of Defense and the authorized external personnel. It is also the main card for physical access to buildings and controlled spaces and provides access to the United States Department of Defense's computer network and systems.</p>
The hardware side of authentication<p>Of course, all this only works if there is a device that can read the cards. In the case of the smart card, this is a terminal. In addition to terminals with an electrical feed, which are used in ATMs, for example, most devices have to be manually inserted. Hence why a mechanism (switch) is required, that recognizes the insertion. The drawing of a card must also be recognized immediately, and the switch-off sequence carried out so that no live contact can damage the smart card.</p><p>The SmartTerminal ST-1144 supports the following chip card protocols: T = 0, T = 1, S = 8, S = 9 and S = 10. In addition to the common Windows operating systems, there are also drivers for Linux and macOS for the smart card Reader. The Department of Defense has also been relying on CHERRY's smart card terminals for a long time, having already used the ST-1144 predecessor models, namely the ST-1000 and the ST-1044.</p>
According to Monster.co.uk, 40% of UK workers are taking the opportunity to work remotely at least once a week, and that 1 in 10 are working from home full-time. Many people now state that they'd turn a job down if working from home isn't offered, yet almost half of employees state that their workplace doesn't have an official policy.
Working from home has to be good for the environment, immediately reducing the pollution caused by vehicle emissions on that daily commute. With everyone conscious of their own carbon footprint, why do workplaces not offer this to more of their workforce?
Insights into the digitisation of the German health care system
Even the ancient Egyptians knew how to perform operations on open skulls – and as historical sources reveal, many patients back then were likely to survive and recover from these complicated surgical interventions. While this provides impressive proof of the medical skills mastered by the ancient Egyptians, we should still consider ourselves fortunate that we've made so many advances in the medical field: Modern medicine would be inconceivable without the use of what are, in part, highly complex IT systems – in fact, information technology represents a basic prerequisite for optimum hospital operations today – and helps ensure all sorts of processes proceed without problems over the course of the everyday work done at clinics.
In a healthcare system that has been digitalised to the extent that it is today, universal, nationwide networking is the next logical step. Work on the corresponding project is currently in full swing: What is known as Telematics Infrastructure (TI) involves setting up a secure, digital platform that improves cooperation in the healthcare sector for everyone involved, and ultimately simplifies it as well. All services that are integrated into this TI must be approved by gematik. New components that have been specifically developed for TI, such as the connector or the eHealth card terminal, also require certification by the Federal Office for Information Security (BSI).
Today's average internet user has around 200 digital accounts, along with all the associated passwords. And this figure keeps rising. However, managing all these passwords in a responsible way isn't necessarily a priority for everyone.
The Dashlane password manager clearly corroborates this finding with real-life examples: An employee of the White House, for example, didn't just write down his log-in data on his employer's official stationary, but also left this piece of paper lying around at a bus stop by accident in the American capital Washington D.C.
CHERRY introduces the MC 4900, a wired 3-button mouse with integrated fingerprint reader which allows easy logon and secure authentication. In particular, businesses and public institutions will benefit from this modern security feature. Ease of use and ergonomics are of the usual high CHERRY standards.
Aanother one of our products received the Blue Angel certification: the CHERRY KC 1000 The Blue Angel certification provides you, the customer, with reliable information about the effects a product and its manufacturing process have on the environment and health.