Features

Corporations must protect data wherever it goes

Corporations must protect data wherever it goes

When it comes to data security, enterprises have historically taken a "stop them at the gates" approach, similar to the purchase of a home security system.
Cliff Pollan, Aug 31 2007 10:43AM Security
A lesson from the PCI

A lesson from the PCI

A benchmark that provides a checklist to tell you if your security meets requirements is just what we need.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 30 2007 1:57PM Security
Global trends point to rise in messaging abuse

Global trends point to rise in messaging abuse

"It's the economy, stupid." It worked for spammers now, and it will work for spammers in the future.
Dave Champine, Aug 29 2007 11:06AM Security
Market your security competencies

Market your security competencies

Historically, IT security has been a business cost centre.
Jay Barbour, Aug 28 2007 9:21AM Security
Review: AppDetective

Review: AppDetective

AppDetective primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 27 2007 1:57PM Security
Anatomy of a data breach from the inside out

Anatomy of a data breach from the inside out

It's a sunny day somewhere thousands of miles away from your data centre. A savvy hacker sits in front of his monitor.
Prat Moghe, Aug 22 2007 7:53AM Security
Copiers are also a compliance issue

Copiers are also a compliance issue

To properly discuss security issues related to multi-function peripheral (MFPs) - devices that copy, print, scan and fax - it's helpful to first have some background on the underlying technology in the machines that have raised so much concern as a possible data security risk.
Chris Bilello, Aug 21 2007 9:18AM Security
Review: Source Code Analysis Suite

Review: Source Code Analysis Suite

The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 20 2007 8:00AM Security
Managing outbound email security threats

Managing outbound email security threats

When the subject of email security is mentioned, the first thought that comes to mind is "spam" or more appropriately "anti-spam."
Carsten Dietrich, Aug 17 2007 11:17AM Security
The battle for e-commerce: Convenience vs. security

The battle for e-commerce: Convenience vs. security

The convenience of doing business on the web has embedded itself into consumers' everyday routines to the point where the ability to quickly complete a multitude of tasks online has come to be expected.
Andy Rolfe, Aug 16 2007 12:16PM Security
The advent of Access Management 2.0

The advent of Access Management 2.0

Everyone loves milestone birthdays and this year - depending on who you believe - web access management (WAM) turns ten. Or 11. Or maybe it's 12. Kids grow up so fast.
Eric Leach Aug 15 2007 7:46AM Security
Review: UTM-1 2050

Review: UTM-1 2050

The Checkpoint UTM-1 appliance features the standard UTM capabilities, such as firewall, IPS, anti-virus and anti-spyware.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 15 2007 7:43AM Security
Review: eToken TMS

Review: eToken TMS

The Aladdin eToken TMS (Token Management System) is software-based and includes the ability to use two-factor authentication, as well as digital signature using the Aladdin tokens.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 14 2007 8:56AM Security
LAN security and NAC checklist

LAN security and NAC checklist

Knowing who's on the LAN. Providing guest access. Limiting contractors. Controlling what users can do on the LAN. Segmenting the LAN. Documenting and auditing user activities.
Tom Barsi, Aug 13 2007 11:23AM Security
Fixing SSL VPN

Fixing SSL VPN

Many of the recent trends in data centre evolution have involved doing more with less by consolidating systems and unifying management - recent technologies such as server and storage virtualisation come to mind.
Michel Susai, Aug 13 2007 11:18AM Security
Review: Digipass Basic Pack OTP

Review: Digipass Basic Pack OTP

The Vasco offering is a software-based product that includes the ability to use two-factor authentication, as well as digital signature with the Vasco tokens.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 13 2007 10:44AM Security
How safe are your health records?

How safe are your health records?

One of the main reasons why people are resisting Internet banking is due to concerns around IT security.
Temp User Aug 10 2007 2:25PM Security
Review: CR250i

Review: CR250i

This product features protection on many levels. It can be deployed as a gateway using NAT, or in bridged mode to protect the network transparently.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 10 2007 1:44PM Security
Review: ASAS

Review: ASAS

The Authenex Strong Authentication System (ASAS) is a server software-based offering like many of the other products in this Group Test.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 8 2007 7:23AM Security
Review: 2Factor Flexible OTP Card

Review: 2Factor Flexible OTP Card

A very unique offering was the TRI-D Systems 2Factor Flexible OTP Card. The product is unique for two main reasons: first, it installed in a Linux platform instead of using a Windows 2003 back-end.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 8 2007 12:48AM Security

Log In

  |  Forgot your password?