Features

Three E approach key to complicated compliance requirements

Three E approach key to complicated compliance requirements

Today's industry regulations are complex and difficult to understand.
Pat Sueltz, Mar 26 2007 10:34AM Security
Hot or not: Reverse code engineering

Hot or not: Reverse code engineering

Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities.
Amol Sarwate, Mar 26 2007 8:03AM Security
Review: Solsoft Policy Server

Review: Solsoft Policy Server

Solsoft Policy Server is a program I wish I had had when I was performing daily firewall, router and VPN installs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security
Review: Proventia Network Mail Security

Review: Proventia Network Mail Security

Email content filter features on the Proventia Network Mail Security appliance include many customisable, easy-to-set-up rules that can be based on a large number of categories.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security
Review: NetMRI

Review: NetMRI

The Netcordia NetMRI product is an appliance-based solution. The hardware is actually quite compact, so the system has a very small footprint.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security
Training for security beyond the PC and network

Training for security beyond the PC and network

Threats to information security are appearing more frequently and are of greater magnitude than ever before.
Larry Kovnat, Mar 22 2007 6:48AM Security
Review: GMS Protected WebMail

Review: GMS Protected WebMail

The GMS Protected WebMail Package can be a complete web-based email platform. It includes onboard protection such as anti-virus and an anti-spam filter, plus its own instant messaging platform and SMS messaging.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 19 2007 12:00AM Security
Review: Mailstream Manager

Review: Mailstream Manager

Acccording to the developer, this product is intended for very large enterprises with complex email requirements.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 19 2007 12:00AM Security
Death by Google

Death by Google

Once a rumour makes it into the Google top-ten searches, the damage can be difficult to undo.
Nick Barron, Mar 15 2007 2:27PM Security
Product section: SC Lab takes a look at email content filtering, policy management products

Product section: SC Lab takes a look at email content filtering, policy management products

The theme in the labs this month was policy, policy and more policy. Lab manager Mike Stephenson looked at email content filtering, which depends on policies for its success, while reviewer Justin Peltier evaluated policy management products. In these two areas, policy determines success, but the two views are quite different.
Peter Stephenson,CeRNS, Mar 14 2007 7:17PM Security
Six simple steps to managing privileged passwords

Six simple steps to managing privileged passwords

One of today's biggest IT headaches is managing privileged passwords, the super-powerful codes such as administrator on a Windows server, Root on a UNIX server, Cisco Enable on a Cisco device, as well as embedded passwords found in applications and scripts.
Calum MacLeod, Mar 13 2007 4:00PM Security
Review: Lumigent Audit DB

Review: Lumigent Audit DB

For years vulnerability assessment and penetration tests have been less than effective at testing the security internal to a database. The Lumigent Audit DB product changes that.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: McAfee Hercules Policy Auditor

Review: McAfee Hercules Policy Auditor

The Hercules Policy Auditor and Remediation Manager were formerly known as Citadel Hercules. These products have one very unique feature in that they can process the output from popular vulnerability scanners.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: NetIQ Secure Config Manager

Review: NetIQ Secure Config Manager

NetIQ Secure Configuration Manager was one of the first products in the policy management space. It is also the most feature-rich solution tested.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: CyberGatekeeper WITH DNAC

Review: CyberGatekeeper WITH DNAC

CyberGatekeeper with dynamic network access control (DNAC) was one of the more challenging products to work with in the review process.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: GPAnywhere

Review: GPAnywhere

GPAnywhere essentially works by installing an extension into the Microsoft Windows 2003 Global Policy Management Client.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
A slow start for virtualisation

A slow start for virtualisation

Fear and indifference are retarding the spread of virtualisation technology in Australian SMEs, despite glowing reviews.

Sholto Macpherson Mar 7 2007 4:23PM Software
Protecting the enterprise in a Vista environment

Protecting the enterprise in a Vista environment

Microsoft’s new Vista operating system has placed more emphasis on security than any previous version of Windows.
Paul Henry Mar 7 2007 10:50AM Security
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

MIMESweeper has been around for a long time. Available in four configurations to support up to a maximum of 3,000 users, the appliance has a moderate level of features. This makes it suitable for small and medium-sized organisations only.
Peter Stephenson, Mar 5 2007 5:00AM Security

Log In

  |  Forgot your password?