Features

Encryption is the last defense for data in a digital world

Encryption is the last defense for data in a digital world

We used to live in an analog world. We played records, radio stations had static interference, we flattened out dollar bills to work in vending machines and we anguished over hanging chads. Sure, everything was converted into bits and bytes in the end, but the world we interacted with was a physical one.
Richard Moulds, Apr 12 2007 4:12PM Security
How to avoid chaos when implementing VoIP

How to avoid chaos when implementing VoIP

Organisations are overlooking the security risks, planning considerations and business needs in the rush to capitalise on VoIP, argues ISPhone’s James Spenceley.
Staff Writers Apr 12 2007 4:05PM Security
Interview: Eugene Kaspersky in Russia

Interview: Eugene Kaspersky in Russia

As Kaspersky Lab targets the global corporate market, its co-founder tells Paul Fisher why he thinks people are not afraid of the Russians.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 11 2007 4:30PM Security
Mobile security: when will it become necessary?

Mobile security: when will it become necessary?

There have been few mobile phone viruses so far, but as more handsets use WiFi and bluetooth, is it just a matter of time? Mark Mayne reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 11 2007 4:23PM Security
Review: Rapid7 NeXpose

Review: Rapid7 NeXpose

Rapid7 NeXpose is, generally, an impressive appliance. Although it is a hybrid (vulnerability scanner and penetration test tool), the pen tool is used specifically to validate vulnerabilities and is not intended to be used alone. This is typical of the way an attacker would attempt to penetrate a target.
Peter Stephenson,CeRNS, Apr 10 2007 12:00AM Security
Review: idEngines Ignition

Review: idEngines Ignition

The idEngines Ignition product provides middleware for 802.1x authentication. The product creates an environment where wireless access points, switches and firewalls can authenticate to the Ignition application, which can then relay the 802.1x authentication request to the correct back-end authentication server.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 10 2007 12:00AM Security
Review: eEye REM Security Manager

Review: eEye REM Security Manager

We found the combination of the REM Security Manager and the Retina Scanner to be easy to use and deploy. In fact, ease of use is this product’s hallmark. The user interface is similar to MS Windows Explorer and is among the most intuitive we’ve seen.
Peter Stephenson,CeRNS, Apr 10 2007 12:00AM Security
Review: Packetsure

Review: Packetsure

Palisade Systems' offering in this category has quite a few useful features. For example, it uses content analysis to find possible areas of data leakage or problem emails.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 3 2007 2:37PM Security
Review: Symantec Mail Security 8300

Review: Symantec Mail Security 8300

Symantec's Mail Security appliance offers features such as filter policies that can be set up for regulatory compliance, data leakage, spam and viruses.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
Review: Proofpoint Messaging Security Gateway

Review: Proofpoint Messaging Security Gateway

By sitting at the gateway between the firewall and mail server the Proofpoint Messaging Security Gateway is able to monitor all incoming and outgoing mail closely for suspicious content or possible threats.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
Review: BigFix Enterprise Suite

Review: BigFix Enterprise Suite

The BigFix Enterprise Suite (BES) really can do it all when it comes to policy management. The product supports a vast array of different operating systems, including Linux, Unix, Mac and Windows clients.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
Review: MailMarshal

Review: MailMarshal

MailMarshal features not only email content filtering ability, but can also be integrated with third-party anti-virus and anti-spyware software such as McAfee and CounterSpy.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
How to protect against Wiki, MySpace and other Web 2.0 threats

How to protect against Wiki, MySpace and other Web 2.0 threats

Time Magazine recently bestowed its prestigious "Person of the Year" honour on "You," recognising the growing social importance of community and collaboration on the web.
Dan Nadir, Mar 28 2007 5:05PM Security
The future of image spam

The future of image spam

In the last six months, image-based spam has pushed its way to the forefront of spam technique discussions. Image-based spam is not new, but it is now wreaking havoc on the effectiveness of many anti-spam products.
Carsten Dietrich, Mar 28 2007 5:00PM Security
Biometric technology attracts venture capital investment

Biometric technology attracts venture capital investment

In response to a security-conscious world, venture capitalists are pumping investment dollars into new surveillance technologies, which are designed to help safeguard people and property.
Deborah Magid, Mar 26 2007 3:45PM Security
Three E approach key to complicated compliance requirements

Three E approach key to complicated compliance requirements

Today's industry regulations are complex and difficult to understand.
Pat Sueltz, Mar 26 2007 10:34AM Security
Hot or not: Reverse code engineering

Hot or not: Reverse code engineering

Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities.
Amol Sarwate, Mar 26 2007 8:03AM Security
Review: Solsoft Policy Server

Review: Solsoft Policy Server

Solsoft Policy Server is a program I wish I had had when I was performing daily firewall, router and VPN installs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security
Review: Proventia Network Mail Security

Review: Proventia Network Mail Security

Email content filter features on the Proventia Network Mail Security appliance include many customisable, easy-to-set-up rules that can be based on a large number of categories.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security
Review: NetMRI

Review: NetMRI

The Netcordia NetMRI product is an appliance-based solution. The hardware is actually quite compact, so the system has a very small footprint.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security

Log In

  |  Forgot your password?