Tag: layer

NBN can't shake layer three concerns 
By Ry Crozier | Apr 15, 2010 | Comment Now 
Dominates the Senate Committee proceedings.
Virtualised servers face security questions 
Mar 17, 2010 | Comment Now 
Rush to replace physical servers could leave firms vulnerable.
Cisco rolls out technology to connect data centres 
By Negar Salek | Feb 18, 2010 | Comment Now 
Allows customers to connect data centres over IP networks.
Serious vulnerability in SSL discovered 
By Angela Moscaritolo | Nov 6, 2009 | Comment Now 
Attacker could intercept an SSL-protected session.
SSL flaw fixing shows industry can work together 
By Iain Thomson | Aug 6, 2009 | Comment Now 
Hackers and corporates co-operate.
Browser SSL warnings shown to be ineffective 
By Angela Moscaritolo | Jul 29, 2009 | Comment Now 
New research shows that Secure Socket Layer (SSL) warnings, used in web browsers to indicate a problem with a web page's certificate or the potential for a man-in-the-middle ...
Securing your IT network, layer by layer 
By Richard Savage | May 19, 2009 | Comment Now 
The identity of an individual and the role they play in the organisation is the only relevant factor when determining what resources they should be allowed to access, according ...
SSL subverted by hacker 
By Iain Thomson | Feb 20, 2009 | Comment Now 
The security of the Secure Sockets Layer (SSL) protocols widely used for ecommerce has been questioned again after a delegate at the Black Hat computer security conference ...
Google improves password security 
By David Neal | Jan 19, 2009 | Comment Now 
Google has unveiled new administration tools designed to improve the use of passwords, in order to boost security for customers using its Google Apps hosted enterprise software ...
Google improves password security 
By David Neal | Jan 17, 2009 | Comment Now 
Google has unveiled new administration tools designed to improve the use of passwords, in order to boost security for customers using its Google Apps hosted enterprise software ...
NetComm signs $3M deal to add security layer to products 
By Lilia Guan | Dec 13, 2007 | Comment Now 
Australian broadband hardware vendor NetComm has signed an exclusive distribution deal with Mako Network Systems.
Multi Network Firewall 2  
Mandriva's Multi Network Firewall 2 uses the open source OpenVPN and takes some of the difficulty out of using this approach. We found that the web interface helps make simple ...
Nortel VPN Gateway 3050  
Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ...
SonicWall SSL VPN 2000  
Once the interfaces are configured for the network in a quick and easy setup process, the SonicWall appliance is administrated via the web interface. This interface starts with ...
Although this product is easy to use, it requires a lot of configuration. The main program is set up on a server via a simple-to-use wizard. Once installed, its interface is ...
AEP Netilla Security Platform  
We found this product to be simple to set up and use. The initial configuration is done via a serial connection, using the command line. This includes choosing the device's ...
Caymas 318  
Designed for use on the Java platform, Caymas Systems' offering in this category has a web interface called the Launchpad. This is intuitive, easy to navigate and well ...
Aventail ST2  
Setup for the Aventail ST2 is simple. You just have to configure the interface through a console connection and you can access the web-based setup wizard. This is easy to ...
Check Point's appliance allows for both web- and network-based SSL connections via a web browser. It allows users to access information through its own, customisable web ...
Top Layer IPS 5500-50  
By Peter Stephenson,CeRNS, | May 1, 2006 | Comment Now 
This device incorporates several features in one box. It has real flexibility, with fully adjustable and customisable policies, port configuration, and management screens. ...
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency