Features

LAN security and NAC checklist

LAN security and NAC checklist

Knowing who's on the LAN. Providing guest access. Limiting contractors. Controlling what users can do on the LAN. Segmenting the LAN. Documenting and auditing user activities.
Tom Barsi, Aug 13 2007 11:23AM Security
Fixing SSL VPN

Fixing SSL VPN

Many of the recent trends in data centre evolution have involved doing more with less by consolidating systems and unifying management - recent technologies such as server and storage virtualisation come to mind.
Michel Susai, Aug 13 2007 11:18AM Security
Review: Digipass Basic Pack OTP

Review: Digipass Basic Pack OTP

The Vasco offering is a software-based product that includes the ability to use two-factor authentication, as well as digital signature with the Vasco tokens.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 13 2007 10:44AM Security
How safe are your health records?

How safe are your health records?

One of the main reasons why people are resisting Internet banking is due to concerns around IT security.
Temp User Aug 10 2007 2:25PM Security
Review: CR250i

Review: CR250i

This product features protection on many levels. It can be deployed as a gateway using NAT, or in bridged mode to protect the network transparently.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 10 2007 1:44PM Security
Review: ASAS

Review: ASAS

The Authenex Strong Authentication System (ASAS) is a server software-based offering like many of the other products in this Group Test.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 8 2007 7:23AM Security
Review: 2Factor Flexible OTP Card

Review: 2Factor Flexible OTP Card

A very unique offering was the TRI-D Systems 2Factor Flexible OTP Card. The product is unique for two main reasons: first, it installed in a Linux platform instead of using a Windows 2003 back-end.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 8 2007 12:48AM Security
Using international standards in your compliance program

Using international standards in your compliance program

In a world of ever-increasing information, security requirements and regulations, companies must manage a complex compliance environment that has resulted in a multitude of linked processes.
Gary Pearsons, Aug 7 2007 4:02PM Security
Review: PRO 5060

Review: PRO 5060

This product includes the usual suspects of firewall, IPS/IDS and anti-virus, but it also brings in some unusual features as well.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 7 2007 3:39PM Security
Review: Proventia MFS MX3006

Review: Proventia MFS MX3006

The IBM-ISS Proventia MFS MX3006 appliance features firewall, anti-virus, anti-spam, IPS and a web content filter.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 6 2007 2:18PM Security
Review: Security Gateway

Review: Security Gateway

The Astaro Security Gateway splits its protection into three categories. These categories are network protection, web filtering and email security. .
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 3 2007 3:04PM Security
UTM or flexible security platform?

UTM or flexible security platform?

The unified threat management bucket is starting to show signs of age.
Richard Steinnon, Aug 3 2007 7:59AM Security
Protecting the king, as well as the castle

Protecting the king, as well as the castle

A new type of threat has emerged that poses a significant risk to businesses - this threat is real. There are examples of it in the news. There are security experts who are warning against the risk. So why are most companies ignoring it?
Jim Doherty, Aug 2 2007 3:53PM Security
Review: SmoothGuard 1000-UTM

Review: SmoothGuard 1000-UTM

SmoothWall breaks its attributes down into four feature sets. These sets include firewall, VPN, email security and web security.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 1 2007 1:56PM Security
Review: Proventia IPS GX6116

Review: Proventia IPS GX6116

The Proventia IPS GX6116 could be considered the high-end sports car of IPS appliances. Not only does this device include several protection and analysis features — such as protocol analysis for more than 140 different network and application protocols, heuristics and pattern matching — but it is built for speed.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 1 2007 12:00AM Security
Review: AppScan 7.5

Review: AppScan 7.5

Watchfire AppScan is a software-based offering, which runs from the Windows platform. You may remember earlier versions of AppScan that required a Linux-based server and were configured and run through a web browser.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 1 2007 12:00AM Security
Review: DefensePro, Version 3.10

Review: DefensePro, Version 3.10

The RadWare DefensePro is an appliance-based product that requires the RadWare InSite appliance for configuration and management. Together these two products are feature-rich and offer the most comprehensive functionality we’ve found.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 1 2007 12:00AM Security
Review: IDS/IPS

Review: IDS/IPS

This device is like a slightly stripped down version of a unified threat manager (UTM). The SecurityMetrics IDS/IPS not only includes IDS/IPS functionality, but it is also a vulnerability assessment tool and it can be configured to be a firewall and router. This appliance is also capable of protecting the network from viruses, pornography, backdoors, cross-site scripting attacks and many other threats.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 1 2007 12:00AM Security
SC Infographic: How to be secure

SC Infographic: How to be secure

Protecting a modern business is not easy. Our guide shows that even the best technology and tactics have limitations.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jul 31 2007 3:39PM Security
Visualise behaviour to stop insider threats

Visualise behaviour to stop insider threats

Doing business in a connected world requires employees, partners and customers to have access to an ever increasing range of information channels. Along with the benefits this access provides, the risk of insider security threats increases.
Gordon Eubanks, Jul 30 2007 9:59AM Security

Log In

  |  Forgot your password?