Features

Review: DataTraveler Secure PE

Review: DataTraveler Secure PE

The Kingston DataTraveler Secure Privacy Edition is a USB thumb drive that encrypts everything on it all the time.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:07PM Security
Review: DeviceWall v4.5

Review: DeviceWall v4.5

The DeviceWall product goes way beyond typical USB security features. DeviceWall can be used as a complete endpoint security product.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:03PM Security
Risk management: Growing pains

Risk management: Growing pains

As security becomes a board-level concern, those in charge of it can no longer hide behind the doors of the IT department.
Rhymer Rigby May 15 2007 5:06PM Security
Long term data integrity and compliance tips

Long term data integrity and compliance tips

As 90 per cent of a company's data is located near- or online, long-term data integrity and protection requirements are becoming increasingly important, especially when facing compliance audits.
Robert Sims, May 15 2007 4:27PM Security
Wireless security: Balancing act

Wireless security: Balancing act

Organisations need to weigh the convenience of wireless networking against the risks to the integrity of their IT systems. Steve Gold reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 15 2007 3:59PM Security
Review: R3000 & ENTERPRISE REPORTER

Review: R3000 & ENTERPRISE REPORTER

The 8e6 R3000 and Enterprise Reporter is a superb product. The feature-rich appliance was easy to set up and performed well. The setup procedure is typical of more advanced appliances. Once a keyboard and monitor are connected to the appliance, a wizard guides the user through setup. Once the initial configuration is complete, policy development is quick and easy thanks to the intuitive web interface.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 15 2007 7:00AM Security
Review: SonicWALL Email Security

Review: SonicWALL Email Security

The SonicWall Email Security appliance features protection against threats such as spam, phishing, virus and zero-day attacks.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 15 2007 12:00AM Security
Review: NetClarity Branch Auditor 5.0

Review: NetClarity Branch Auditor 5.0

Last year we reviewed NetClarity’s Enterprise Auditor product and we liked it a lot. This year we looked at its little sibling, the Branch Auditor. We were amazed at the power of this little handful of an appliance.
Peter Stephenson,CeRNS, May 15 2007 12:00AM Security
Review: Core Impact 6.0

Review: Core Impact 6.0

Impact 6.0 from Core Security is a pure penetration testing tool. It is optimised for production use and comes with a suite of pre-programmed exploits. The support agreement provides regular updates with new exploits. Users can write their own exploits and can add to existing ones in the library. Impact can perform pre-configured scenarios or individual exploits.
Peter Stephenson,CeRNS, May 15 2007 12:00AM Security
Review: Utimaco SafeGuard Easy

Review: Utimaco SafeGuard Easy

Utimaco SafeGuard Easy is just what its name promises — the package is easy enough to install that the average end-user could do it. The 24-page installation manual is straightforward and covers both standalone and enterprise installation.
Justin Peltier May 15 2007 12:00AM Security
CIPA key to keeping students safe on the web

CIPA key to keeping students safe on the web

Pornography. Adult Chat Rooms. Violence. Child Stalking. Hacking. There are millions of websites that house offensive content that minors should not be exposed to, and their presence is compounded by their accessibility.
Joshua Block, May 8 2007 4:58PM Security
Training for quick privacy wins

Training for quick privacy wins

A survey of privacy managers at an Open Compliance and Ethics Group (OCEG) event in January revealed that more than two-thirds are seeing moderate to material increases in external scrutiny - with almost half reporting material increases.
Ted Frank, May 8 2007 4:49PM Security
Understanding X-morphic exploitation

Understanding X-morphic exploitation

The concept of malware morphing is not new. For years, malware authors and anti-virus researchers have documented and classified the methods used to obfuscate and hide malware code with each infection.
Gunter Ollmann, May 8 2007 11:13AM Security
Sophisticated web threats flummox most two-factor solutions

Sophisticated web threats flummox most two-factor solutions

The financial industry has been hit hard by the increasing sophistication of web-based threats, including online phishing and identity theft attacks. According to Gartner, these attacks caused losses upwards of US$2.8 billion in 2006 and the numbers don't seem to be abating in 2007.
John Terrill, May 8 2007 11:07AM Security
Review: Forensic Tool Kit v 1.70

Review: Forensic Tool Kit v 1.70

AccessData is one of the venerable developers of computer forensic software. The company’s biggest strength is that it is — and has been since its inception — the go-to supplier of password recovery tools.
Peter Stephenson,CeRNS, May 8 2007 7:54AM Security
Review: DirectPointe security package

Review: DirectPointe security package

DirectPointe provided a hosted security offering which included managed firewall and managed intrusion prevention. The offering uses a SonicWall-based firewall that performs automatic blocking of network attacks.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 8 2007 7:01AM Security
Four steps to guard against data leakage from the endpoint

Four steps to guard against data leakage from the endpoint

The influx of inexpensive storage media — from MP3 players and PDAs to USB thumb drives and external hard drives — in today's enterprise facilitates the dissemination of information further and further away from the enterprise core, and attackers are writing increasingly complex, customised malicious code designed to compromise a company's proprietary information.
Dennis Szerszen, May 7 2007 5:11PM Security
Social networking presents new challenges for business

Social networking presents new challenges for business

The popularity of online streaming videos, social-networking and shopping sites have created new attack vectors for hackers to spread malicious code that could wreak havoc on company networks.
Brett Schechter, May 7 2007 3:07PM Security
Hot or not: Software as a service

Hot or not: Software as a service

SaaS is no longer just about CRM — more security vendors are revamping their applications to be delivered as services over the web.
Amol Sarwate, May 7 2007 2:57PM Security
Review: SSO Express Standard Edition

Review: SSO Express Standard Edition

The Evidian product suite was one of the most complete identity management suites that we tested. As with most complete identity management products that cover provisioning, password self reset, workflow automation and distributed management, it is a complex product to install and configure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 7 2007 6:00AM Security

Log In

  |  Forgot your password?