layer

NBN can't shake layer three concerns

NBN can't shake layer three concerns

Dominates the Senate Committee proceedings.
Apr 15 2010 1:06PM
Virtualised servers face security questions

Virtualised servers face security questions

Rush to replace physical servers could leave firms vulnerable.
Mar 17 2010 11:39AM
Cisco rolls out technology to connect data centres

Cisco rolls out technology to connect data centres

Allows customers to connect data centres over IP networks.
Feb 18 2010 1:08PM
Serious vulnerability in SSL discovered

Serious vulnerability in SSL discovered

Attacker could intercept an SSL-protected session.
Nov 6 2009 11:25AM
SSL flaw fixing shows industry can work together

SSL flaw fixing shows industry can work together

Hackers and corporates co-operate.
Aug 6 2009 7:02AM
Browser SSL warnings shown to be ineffective

Browser SSL warnings shown to be ineffective

New research shows that Secure Socket Layer (SSL) warnings, used in web browsers to indicate a problem with a web page's certificate or the potential for a man-in-the-middle attack (MITM), are ineffective.
Jul 29 2009 11:33AM
Securing your IT network, layer by layer

Securing your IT network, layer by layer

The identity of an individual and the role they play in the organisation is the only relevant factor when determining what resources they should be allowed to access, according to Netsolutions' Richard Savage.
May 19 2009 12:03PM
SSL subverted by hacker

SSL subverted by hacker

The security of the Secure Sockets Layer (SSL) protocols widely used for ecommerce has been questioned again after a delegate at the Black Hat computer security conference showed how the system could be easily bypassed.
Feb 20 2009 3:02PM
Google improves password security

Google improves password security

Google has unveiled new administration tools designed to improve the use of passwords, in order to boost security for customers using its Google Apps hosted enterprise software offerings.
Jan 19 2009 10:42AM
Google improves password security

Google improves password security

Google has unveiled new administration tools designed to improve the use of passwords, in order to boost security for customers using its Google Apps hosted enterprise software offerings.
Jan 17 2009 8:59AM
NetComm signs $3M deal to add security layer to products

NetComm signs $3M deal to add security layer to products

Australian broadband hardware vendor NetComm has signed an exclusive distribution deal with Mako Network Systems.
Dec 13 2007 1:15PM
Review: Multi Network Firewall 2

Review: Multi Network Firewall 2

Mandriva's Multi Network Firewall 2 uses the open source OpenVPN and takes some of the difficulty out of using this approach. We found that the web interface helps make simple steps of creating users and user certificates, which streamlines the process immensely. We liked the organized web interface and found it easy to use.
Dec 18 2006 12:00AM
Review: Nortel VPN Gateway 3050

Review: Nortel VPN Gateway 3050

Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ourselves looking through different guides trying to locate configuration information. The absence of a quickstart card or a getting started guide makes this task even more difficult.
Dec 1 2006 12:00AM
Review: SonicWall SSL VPN 2000

Review: SonicWall SSL VPN 2000

Once the interfaces are configured for the network in a quick and easy setup process, the SonicWall appliance is administrated via the web interface. This interface starts with the system dashboard, which shows all system information in a user-friendly layout. The web interface organises all tasks on the left side of the screen in several tabs.
Oct 1 2006 12:00AM
Review: webNetwork

Review: webNetwork

Although this product is easy to use, it requires a lot of configuration. The main program is set up on a server via a simple-to-use wizard. Once installed, its interface is organized with a clumsy tree menu to the left and a configuration menu on the right. The menus can be confusing and awkward to work with.
Oct 1 2006 12:00AM
Review: AEP Netilla Security Platform

Review: AEP Netilla Security Platform

We found this product to be simple to set up and use. The initial configuration is done via a serial connection, using the command line. This includes choosing the device's network and name settings. Once the device has an internet provider, it can then be administrated via the web interface. The web GUI is simple and stripped down, consisting of a main tree menu on the left and a display window on the right. The menu is easy to navigate and quite intuitive.
Oct 1 2006 12:00AM
Review: Caymas 318

Review: Caymas 318

Designed for use on the Java platform, Caymas Systems' offering in this category has a web interface called the Launchpad. This is intuitive, easy to navigate and well organised. We had no trouble at all setting up users and creating user access policies. Generally, this appliance boasts the types of features that administrators like. It is easy to set up and maintain and requires little ongoing maintenance once it is in operation.
Oct 1 2006 12:00AM
Review: Aventail ST2

Review: Aventail ST2

Setup for the Aventail ST2 is simple. You just have to configure the interface through a console connection and you can access the web-based setup wizard. This is easy to follow and guides you through the creation of the administrator account.
Oct 1 2006 12:00AM
Review: Connectra

Review: Connectra

Check Point's appliance allows for both web- and network-based SSL connections via a web browser. It allows users to access information through its own, customisable web portal. The range of applications users can access include web-based applications and resources, shared files and email. The Connectra also incorporates its own intrusion prevention system, which provides extra security.
Oct 1 2006 12:00AM
Review: Top Layer IPS 5500-50

Review: Top Layer IPS 5500-50

This device incorporates several features in one box. It has real flexibility, with fully adjustable and customisable policies, port configuration, and management screens. It also offers several different report types, which make finding clear information about attacks or network activity easy. Reports can also be created according to a schedule set by an administrator and saved on the device for review later.
May 1 2006 12:00AM

Log In

Username:
Password:
|  Forgot your password?