Features

Review: Open Space Security

Review: Open Space Security

The Kaspersky Open Space Security suite has many of the features necessary for good network protection. The suite includes protection on both the email and web levels.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jun 18 2007 3:13PM Security
Bringing the people component to ITIL

Bringing the people component to ITIL

ITIL speaks to a broad range of IT disciplines, including incident, problem, change, release, and configuration management, as well as IT service continuity and security management.

Staff Writers Jun 15 2007 2:18PM Security
Review: Endpoint Security Suite v3.2

Review: Endpoint Security Suite v3.2

The Senforce Endpoint Security Suite (ESS) is a completely different offering than the other products in this category.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jun 15 2007 12:02PM Security
Compliance: Stay ahead of the game

Compliance: Stay ahead of the game

Don't sit around waiting for the next piece of legislation. It's better to be adaptable and make general compliance your aim. Rob Buckley reports.
Rob Buckley Jun 15 2007 11:54AM Security
Case study: How a company can grow and still protect data

Case study: How a company can grow and still protect data

As a fast growing company that has developed its business around proprietary technologies, WebEx faced the same dilemma.
Randy Barr, Jun 15 2007 11:37AM Security
Review: Enterprise 7.5

Review: Enterprise 7.5

The AirMagnet Enterprise application is a software-based offering which runs on the Win32 platform.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jun 14 2007 3:00PM Security
The evolving role of the CIO

The evolving role of the CIO

IT security has the potential to impact a business at every level. Few other business areas, if any, have the potential to damage customer relations, disrupt supplier dealings, lower employee productivity, lose revenue and even lead to the arrest of the CEO.
Martin Carmichael, Jun 12 2007 1:50PM Security
Securing data in motion vs. data at rest? It’s the wrong question!

Securing data in motion vs. data at rest? It’s the wrong question!

Securing vital and sensitive corporate data is an ongoing and forefront concern for any organisation. However, recently there have been numerous vendor announcements for new products claiming to solve data security problems and compliance challenges by either protecting “data in motion” or “data at rest.”
David Shaw Jun 6 2007 10:40AM Security
Legal matters: Keep everyone in the loop

Legal matters: Keep everyone in the loop

IT security teams need to know about confidentiality clauses in contracts.
Tamzin Matthew Jun 5 2007 4:20PM Security
Review: SafeGuard Removable Media 1.0

Review: SafeGuard Removable Media 1.0

SafeGuard RemovableMedia is an interesting product. It has one purpose and one purpose only: to ensure that no data leaves the computer on a USB drive without being encrypted first. It is not particularly expensive and this little piece of software could make a big difference in how secure sensitive data is when it is away from the desktop or the server.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jun 5 2007 1:46PM Security
Profile: Gary McKinnon mastermind behind US military hack

Profile: Gary McKinnon mastermind behind US military hack

Being public enemy number one is a lot more mundane than you might think, the notorious hacker tells Paul Fisher as he awaits extradition.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jun 4 2007 11:07AM Security
Review: Proventia Desktop

Review: Proventia Desktop

Proventia Desktop focuses on two areas, the first being protection from spyware. This product analyses network downloads to stop the spread of new spyware, and also stops existing spyware from running by stopping unauthorised application communication outside the desktop.
Peter Stephenson,CeRNS, Jun 1 2007 12:00AM Security
Review: NOD32

Review: NOD32

This product contains several pieces that integrate very well. When combined, it covers protection from viruses, worms, spyware and other malicious attacks. The pieces include anti-virus monitor, email monitor, document monitor and internet monitor. The monitors are delegated to serve their specific purpose; therefore, protection is complete and no one monitor is overburdened. The monitors work nicely together to proactively protect the computers.
Peter Stephenson,CeRNS, Jun 1 2007 12:00AM Security
Google Mapplets and Google Gears details

Google Mapplets and Google Gears details

Amazing new web technology announced at Google Developer Day in Sydney. What has Google invented now?
Ed Dawson , David Field May 31 2007 12:23PM Software
Review: Protector v3.1

Review: Protector v3.1

The Safend Protector offers many features to provide a high level of USB security both at the interface and removable media levels.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 31 2007 8:57AM Security
USB - the Achilles' heel of data security

USB - the Achilles' heel of data security

Few can imagine going back to a world without tools for mobility. The ability to access and process digital information with laptops and other handheld devices has forever changed our lives.
Peter Larsson, May 29 2007 4:40PM Security
Tips for a security team's role in e-discovery

Tips for a security team's role in e-discovery

Electronic discovery (e-discovery) is a topic generally limited to legal circles. Although recent case law and the revised Federal Rules of Civil Procedure (FRCP) are aimed squarely at judges and lawyers, both have profound implications for IT and security organisations, given the significant amount of electronically stored information (ESI) that is relevant for court cases.
Trent Henry, May 29 2007 4:36PM Security
Darknets provide globally scoped analysis

Darknets provide globally scoped analysis

The internet has come under a sustained and significant threat from network malware, especially since the emergence of the global Windows network worm in 2001 with Code Red and Nimda. Prior to this, most network worms were on a small, localised scale.
Jose Nazario, May 29 2007 4:32PM Security
Go from 'visibly victimised' to 'silently competent'

Go from 'visibly victimised' to 'silently competent'

When Dr. Gene Spafford and I wrote the original version of the Tripwire software program in 1992, it was to help solve the security problem of how to restore systems to a known good state after they have been compromised.
Gene Kim, May 29 2007 4:28PM Security
We're only trying to help

We're only trying to help

User feedback can provide free online consumer research and security reports, so why is it impossible to leave any?
Nick Barron May 29 2007 4:23PM Security

Log In

  |  Forgot your password?