Features

Training for security beyond the PC and network

Training for security beyond the PC and network

Threats to information security are appearing more frequently and are of greater magnitude than ever before.
Larry Kovnat, Mar 22 2007 6:48AM Security
Review: GMS Protected WebMail

Review: GMS Protected WebMail

The GMS Protected WebMail Package can be a complete web-based email platform. It includes onboard protection such as anti-virus and an anti-spam filter, plus its own instant messaging platform and SMS messaging.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 19 2007 12:00AM Security
Review: Mailstream Manager

Review: Mailstream Manager

Acccording to the developer, this product is intended for very large enterprises with complex email requirements.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 19 2007 12:00AM Security
Death by Google

Death by Google

Once a rumour makes it into the Google top-ten searches, the damage can be difficult to undo.
Nick Barron, Mar 15 2007 2:27PM Security
Product section: SC Lab takes a look at email content filtering, policy management products

Product section: SC Lab takes a look at email content filtering, policy management products

The theme in the labs this month was policy, policy and more policy. Lab manager Mike Stephenson looked at email content filtering, which depends on policies for its success, while reviewer Justin Peltier evaluated policy management products. In these two areas, policy determines success, but the two views are quite different.
Peter Stephenson,CeRNS, Mar 14 2007 7:17PM Security
Six simple steps to managing privileged passwords

Six simple steps to managing privileged passwords

One of today's biggest IT headaches is managing privileged passwords, the super-powerful codes such as administrator on a Windows server, Root on a UNIX server, Cisco Enable on a Cisco device, as well as embedded passwords found in applications and scripts.
Calum MacLeod, Mar 13 2007 4:00PM Security
Review: Lumigent Audit DB

Review: Lumigent Audit DB

For years vulnerability assessment and penetration tests have been less than effective at testing the security internal to a database. The Lumigent Audit DB product changes that.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: McAfee Hercules Policy Auditor

Review: McAfee Hercules Policy Auditor

The Hercules Policy Auditor and Remediation Manager were formerly known as Citadel Hercules. These products have one very unique feature in that they can process the output from popular vulnerability scanners.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: NetIQ Secure Config Manager

Review: NetIQ Secure Config Manager

NetIQ Secure Configuration Manager was one of the first products in the policy management space. It is also the most feature-rich solution tested.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: CyberGatekeeper WITH DNAC

Review: CyberGatekeeper WITH DNAC

CyberGatekeeper with dynamic network access control (DNAC) was one of the more challenging products to work with in the review process.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: GPAnywhere

Review: GPAnywhere

GPAnywhere essentially works by installing an extension into the Microsoft Windows 2003 Global Policy Management Client.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
A slow start for virtualisation

A slow start for virtualisation

Fear and indifference are retarding the spread of virtualisation technology in Australian SMEs, despite glowing reviews.

Sholto Macpherson Mar 7 2007 4:23PM Software
Protecting the enterprise in a Vista environment

Protecting the enterprise in a Vista environment

Microsoft’s new Vista operating system has placed more emphasis on security than any previous version of Windows.
Paul Henry Mar 7 2007 10:50AM Security
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

MIMESweeper has been around for a long time. Available in four configurations to support up to a maximum of 3,000 users, the appliance has a moderate level of features. This makes it suitable for small and medium-sized organisations only.
Peter Stephenson, Mar 5 2007 5:00AM Security
Review: AEP Networks SmartGate

Review: AEP Networks SmartGate

AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the OSI model. The product is similar to a typical SSL VPN, but with added authentication components that make the user’s authentication tunnel more secure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

SurfControl is, arguably, the granddaddy of the web content filtering class. Supplied as software, this product requires its own server platform running Microsoft Windows Server 2003 and SQLServer. Its straightforward drag-and-drop rules engine makes policy creation easy. However, deployment, setup, and configuration were a bit more demanding than for similar products.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
10 ways to protect intellectual property

10 ways to protect intellectual property

Intellectual property (IP) assets are at the heart of businesses. Increasingly these assets are available in digital formats: Microsoft Word files, Excel spreadsheets etc, making them easy targets.
Ratinder Paul Feb 28 2007 3:21PM Security
Document security: Safe words

Document security: Safe words

Choosing the right content management system is crucial to keeping your digital files secure. But it's only the first step. Rob Buckley reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Interview: Tomas Olovsson

Interview: Tomas Olovsson

Why the co-founder and CTO of AppGate came up with a solution for deperimeterisation before anyone had ever heard of it.
Paul Fisher Feb 28 2007 2:27PM Security

Log In

  |  Forgot your password?