Features

Review: AEP Networks SmartGate

Review: AEP Networks SmartGate

AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the OSI model. The product is similar to a typical SSL VPN, but with added authentication components that make the user’s authentication tunnel more secure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

SurfControl is, arguably, the granddaddy of the web content filtering class. Supplied as software, this product requires its own server platform running Microsoft Windows Server 2003 and SQLServer. Its straightforward drag-and-drop rules engine makes policy creation easy. However, deployment, setup, and configuration were a bit more demanding than for similar products.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
10 ways to protect intellectual property

10 ways to protect intellectual property

Intellectual property (IP) assets are at the heart of businesses. Increasingly these assets are available in digital formats: Microsoft Word files, Excel spreadsheets etc, making them easy targets.
Ratinder Paul Feb 28 2007 3:21PM Security
Document security: Safe words

Document security: Safe words

Choosing the right content management system is crucial to keeping your digital files secure. But it's only the first step. Rob Buckley reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Interview: Tomas Olovsson

Interview: Tomas Olovsson

Why the co-founder and CTO of AppGate came up with a solution for deperimeterisation before anyone had ever heard of it.
Paul Fisher Feb 28 2007 2:27PM Security
Peer-to-peer: Shared property security pay

Peer-to-peer: Shared property security pay

P2P is here to stay, so shore up your defences and embrace the technology's potential for a distributed architecture.
Mark Mayne Feb 28 2007 2:27PM Security
XSS is a large problem

XSS is a large problem

Seen as an end-user issue, cross-site scripting has been ignored for too long. Now attacks are on the rise.
Ken Munro Feb 28 2007 2:27PM Security
Legal matters: Outsourcing and the law

Legal matters: Outsourcing and the law

Always clarify in outsourcing deals who is liable for data security, advises Tamzin Matthew.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Opinion: Caught between yes and no

Opinion: Caught between yes and no

CIOs are blamed either for being unable to deliver on commitments, or for creating roadblocks hampering business development.
Staff Writers Feb 27 2007 12:51PM Security
Accelerating the path to WAN optimisation

Accelerating the path to WAN optimisation

In today’s fast-paced and technologically-driven environment, the need for instant real-time communication is critical for any business to remain competitive. It is not unusual for offices in Australia to exchange information with locations around the world on a daily basis.
Wayne Neich Feb 26 2007 2:58PM Security
Passwords management for UNIX and Linux systems

Passwords management for UNIX and Linux systems

An unhappy systems administrator who may want to teach a seemingly unappreciative company a lesson. An employee who is passed over for a promotion or a raise. An IT manager who is disappointed by a bonus. A technically savvy database administrator willing to change information in the Oracle Financial Suite for a CEO whose future is riding on the next stock analyst's recommendation.
Ellen Libenson, Feb 26 2007 7:12AM Security
Growing number of SMBs going 'in the cloud'

Growing number of SMBs going 'in the cloud'

On-demand security services, or "in the cloud" services, refer to security technology that is managed from a central location and delivered over the Internet, eliminating the need for small to medium sized businesses (SMBs) to deal with the high costs of hardware deployment, software upkeep and future scalability.
Anthony Pitpit, Feb 26 2007 6:26AM Security
Evolution of employee monitoring stretches far beyond email

Evolution of employee monitoring stretches far beyond email

The concept of organisations keeping a watchful eye on employees during company hours is nothing new.
Sandra Vaughan, Feb 26 2007 5:35AM Security
Review: WEBWASHER 6.0

Review: WEBWASHER 6.0

Secure Computing's Webwasher is a strong product in almost every regard. We especially liked its ability to perform individual analysis on words and phrases, as well as scanned images. This goes well beyond typical blacklists for URL blocking and keyword lists for filtering.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 26 2007 12:00AM Security
Review: M-Tech ID Synch and P Synch

Review: M-Tech ID Synch and P Synch

M-Tech ID Synch and P Synch are two companion programs that are available to perform identity management. The ID Synch package performs most of the identity management tasks including provisioning, workflow creation, distributed administration and reporting.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 26 2007 12:00AM Security
Review: Cyber-Ark Password Vault

Review: Cyber-Ark Password Vault

The Cyber-Ark Password Vault software is another example of implementing a subset of identity management features with a focus on simplicity.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 26 2007 12:00AM Security
Train employees - your best defense - for security awareness

Train employees - your best defense - for security awareness

With so many security threats on the horizon, it may be comforting to know the strongest security asset is already inside the company employees.
Luis Navarro, Feb 21 2007 8:45PM Security
Review: ST BERNARD iPRISM M3100

Review: ST BERNARD iPRISM M3100

The St Bernard iPrism M3100 is an appliance that provides a reasonably wide range of web content filtering related features. Using access-control lists, the device allows real granularity in how and when the internet can be accessed. For example, by using access-control lists, various rule sets can be applied to different days of the week and specific times. The architecture of the appliance can be pass-through or proxy.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 20 2007 12:00AM Security
Review: NETWORK COMPOSER 7

Review: NETWORK COMPOSER 7

Cymphonix describes the function of Network Composer 7 as "internet data stream control technology". In this regard, the product looks at whatever passes through the appliance and makes judgments based on the contents of the data stream. An example is the ability to detect efforts to bypass controls by using a web anonymiser such as Anonymouse as a proxy for surfing disallowed sites.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 20 2007 12:00AM Security
Compliance plus governance equals long-term gains

Compliance plus governance equals long-term gains

CIOs today have an opportunity and a challenge: helping their organisations implement critical processes, policies and procedures that not only yield immediate, short-term results but also long-term business gains.
David Thompson, Feb 19 2007 7:20PM Security

Log In

  |  Forgot your password?