Radionics' RISSC™ Wins Award ¾ No Hacker Can Crack a Code that Doesn't Exist

SALINAS, CALIFORNIA -- Nov. 9, 1998 -- Radionics and Market Central, Inc. answered a call from the government to develop an information security system that eliminates unauthorized internal and external access to proprietary information. This system was developed under a Cooperative Research and Development Agreement (CRADA) with the Naval Air Warfare Center Weapons Division. A HARDWARE firewall, Radionics' Readykeyâ Information Security System for Computers -- RISSCÔ (patent pending) offers a CODELESS, PHYSICAL barrier to critical information. RISSC™ was recently chosen from a large pool of entries by the Security Industry Association as one of the "Security Industry's Finest" new products for 1998. With no codes to crack, RISSC™ makes software firewalls look like child's play.

COMPUTER CRIME IS ESCALATING ¾ ONLY RISSC™ CAN PREVENT YOUR SYSTEM FROM BEING THE NEXT VICTIM

To underscore the soaring need for a product like RISSC™, the Computer Security Institute's 1998 CSI/FBI Computer Crime and Security Survey revealed computer crime is rising dramatically, with more than six out of every 10 businesses, government offices and universities reporting computer security breaches during 1997… that's a 22% increase since 1996. The survey also discovered that the most likely suspects increasingly include an employee or domestic competitor whereas in the past, foreign competitors and governments ranked highest among cyber-espionage suspects. RISSC™ is the only product on the market today that can stop hackers from trespassing simply because of how it works.

HOW RISSC™ IS ONE OF A KIND

First and foremost, RISSC™ provides a HARDWARE firewall. RISSC™ is the only security system for computers that provides a physical AND electronic disconnect thereby preventing internal and external hackers access to critical information ¾ other systems provide only one or the other, leaving the systems they "secure" vulnerable to attack. "You can't hack something that is physically and electronically disconnected," says Larry Tracy, President of Radionics.

For banks or large corporations with both secured and unsecured networks, there is a dual relay switch that RISSC™ provides to eliminate hackers from bridging the networks and stealing vital information. For small to mid-size businesses with an unsecured network, there is a single relay switch that is designed to prevent unauthorized users from gaining access to hard drives.

The applications are unlimited for System Administrators. RISSC™ is also the only known computer security system that works with any computer platform, is independent of computers and servers, is not affected by system upgrades, and provides such vital statistics as name, date, and time each user entered/exited the system.

HOW RISSC™ PROTECTS YOUR INFORMATION (DUAL RELAY SWITCH MODEL)

RISSC™ controls the "doors" of information between computers and networks. RISSC™ looks at each Information Systems Platform as a building that houses information and each Network as another building (computer). The system administrator can program RISSC™ to determine when and where a user may enter the system. When a user presents his/her credential to a computer, the computer power is turned on, if the user is authorized. When a user is required to make a connection to an outside network, the user physically turns the network switch to the outside position. Once in this position, the internal LAN is protected from an outside intruder coming into the LAN by a physical gap created by the network switch. The user presents his/her credential to the proximity reader located on the network switch. Again the system identifies who the user is and the time and date the user entered the network and then makes the connection, again based on authorization. If the user is not authorized, an alarm is generated and sent to the System Administrator, telling him/her the time, date, computer and name of user attempting entry. All of the user information can be archived for permanent storage and retrieved at any time and in real time by the System Administrator or Program Manager.

 

NOTHING ELSE LIKE IT EXISTS ON THE MARKET TODAY

Protecting systems from cyber-terrorists is the most important issue today for corporate executives, bank managers, government officials, and private business owners alike. CSI's survey found that losses from organizations that were attacked ranged from $50 in damages to one corporation reporting $25 million in proprietary information. RISSC™ will protect your information 24 hours a day, 7 days a week.

The same credential used for RISSC™ can also be used for an integrated Access Control Security System with elevator, perimeter, etc. control and photo badging.

With no codes to hack and no "bridge" between you and an outside network, RISSCÔ is the only risk you can't afford NOT to take.

Radionics is a subsidiary of Detection Systems, Inc.

 

MEDIA CONTACT: Radionics

Drew Chernoy, (NXX-NXX-XXXX), ext. 1384

jcolagreco@radionicsinc.com

CONTACT FOR SALES: (NXX-NXX-XXXX), ext. 1570





Radionics Website RISSC Main Page What is RISSC? Security Breaches by Type RISSC Configuration Case Study More RISSC Info