Eric Doyle

Recent articles by Eric Doyle

Orange forms cloud with VMware, Cisco and EMC

Orange forms cloud with VMware, Cisco and EMC

Carrier recruits VCE alliance to offer web services.
Sep 29 2010 6:42AM
Malware: over a million websites dish it up

Malware: over a million websites dish it up

Dasient claims poisoned sites are reaching epidemic proportions.
Sep 20 2010 9:36AM
US scientists build robots that lie

US scientists build robots that lie

The digital age of innocence is truly over.
Sep 17 2010 11:11AM
Review: Active Folders Content Manager

Review: Active Folders Content Manager

Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.

Jul 27 2005 12:00AM
Review: MIMEsweeper for SMTP

Review: MIMEsweeper for SMTP

This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.

Jul 27 2005 12:00AM
Review: Adobe LiveCycle Policy Server

Review: Adobe LiveCycle Policy Server

Policy Server appeared with the release of Acrobat 7 earlier this year. It builds substantially on the encryption and password security of past editions of Acrobat and provides control over how Acrobat PDF format documents are accessed.

Jul 27 2005 12:00AM
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

ECM started as a Windows inventory management tool, but has moved with the times. This release turns it into a systems policy management and compliance system for Windows, Solaris and Red Hat.

Jul 27 2005 12:00AM
Review: NETconsent

Review: NETconsent

Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.

Jul 27 2005 12:00AM
Review: Policy Commander

Review: Policy Commander

Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.

Jul 27 2005 12:00AM
Review: PolicyMatter

Review: PolicyMatter

Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.

Jul 27 2005 12:00AM
Review: UniGuard-V34 & Port Authority 44

Review: UniGuard-V34 & Port Authority 44

The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.

Jul 27 2005 12:00AM
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Jul 27 2005 12:00AM
Review: Websense Enterprise

Review: Websense Enterprise

This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.

Jul 27 2005 12:00AM
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Jul 27 2005 12:00AM
Review: Backup for Workgroups

Review: Backup for Workgroups

Backup for Workgroups is an unpretentious name for what turns out to be an uncomplicated product. Not much about this product is very clever, but that works to its advantage. Its lack of sophistication makes it a must-have for the workgroups it mentions, and for many more small business networks who might miss the point.

Nov 8 2004 12:00AM
Review: Ghost Corporate Edition

Review: Ghost Corporate Edition

One of the

Aug 2 2004 12:00AM
Review: Pervasive AuditMaster

Review: Pervasive AuditMaster

Pervasive's SQL database is designed to be embedded in applications designed for small to medium businesses. AuditMaster has been created to ensure that changes to the database are efficiently and accurately logged. The audit trail produced not only allows the database manager to keep track of routine changes, but also sends alerts if and when key data, such as staff salaries or catalog prices, are altered.

Aug 2 2004 12:00AM
Review: Dynamic Network Administration

Review: Dynamic Network Administration

This product is not designed to be a patch management application, but its software distribution capabilities can be used to roll out fixes, updates and service packs.<
Jun 4 2004 12:00AM
Review: HFNetChkPro

Review: HFNetChkPro

HFNetChkPro might well suffer from having a dreadful name, but it boasts a top technical pedigree.
Jun 4 2004 12:00AM
Review: LANGuard Network Security Scanner

Review: LANGuard Network Security Scanner

This is a security scanner that includes patch management.
Jun 4 2004 12:00AM

Log In

Username / Email:
Password:
  |  Forgot your password?