Features

Tailor your mobile security plan for the iPod generation

Tailor your mobile security plan for the iPod generation

Ever since the emergence of iPod back in 2004, GFI and other experts including Gartner analysts, Ruggero Contu and John Girard have been warning that iPods are a potential danger to the corporate network.
Andre' Muscat, Dec 27 2006 9:39PM Security
Review: Multi Network Firewall 2

Review: Multi Network Firewall 2

Mandriva's Multi Network Firewall 2 uses the open source OpenVPN and takes some of the difficulty out of using this approach. We found that the web interface helps make simple steps of creating users and user certificates, which streamlines the process immensely. We liked the organized web interface and found it easy to use.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: Tenable Security Center

Review: Tenable Security Center

The Tenable Security Center has massive capability wrapped in a single, easy-to-navigate interface. While the overall use of the application is fairly intuitive, once users explore more deeply, they may find that it becomes complex and intricate. This allows for great flexibility, but also requires some time of using the product and learning how to maximize its capability for the specific environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: TriGeo SIM

Review: TriGeo SIM

From the time it is plugged in, all the way through day-to-day management, TriGeo SIM is simple to use. The appliance comes with many rule sets already preconfigured for most security situations, while setting rules for specific environments is made easy by the Rule Builder. This tool uses different modules with rule parts that you just drag and drop into the right place and the rule is created. Filters also are easy to configure using the same process. The main console interface is simple and intuitive to navigate as well.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Securing the future of information technology

Securing the future of information technology

Running parallel to the huge business benefits brought about by the ubiquitous and increasingly open-access use of computers are huge risks resulting from information security breaches.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 15 2006 12:14PM Security
Make sure your end users are in compliance

Make sure your end users are in compliance

With the ubiquity of the internet, Wi-Fi hotspots and USB devices, the possibilities for unauthorised software on company PCs now seem endless.
Todd Brennan, Dec 11 2006 11:36AM Security
Review: Activeworx Security Center

Review: Activeworx Security Center

We found this product required some time to work with and to learn about its massive capability. Set-up overall was fairly simple, but the user interface is a little clumsy in the beginning. The Security Center desktop is quite overwhelming at first, with multiple view selections, tabs and tree menus. But once we started working with the interface, we found it quite efficient.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Review: ID-Certify

Review: ID-Certify

We now find ourselves in a world of regulatory compliance. It didn't use to be that way, but it is a fact of life we cannot ignore. In a sense, it is good for us who administer and manage IT systems as it forces us to adopt responsible practices, especially around access control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Review: Solsoft Policy Server 7

Review: Solsoft Policy Server 7

Within any sizeable network, the issues around maintaining known configurations from a security perspective can become problematic. Similarly, maintaining a compliant infrastructure, together with its attendant processes, can represent quite a challenge. Add to this the requirements for change control, access control and other factors, and one can readily appreciate that this challenge can become significant in terms of both resource and cost.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Vista validates encryption for mobile and endpoint security

Vista validates encryption for mobile and endpoint security

Long viewed as a major vector for incoming threats such as viruses, malware and worms, organisations are also increasingly viewing laptops as a primary weakness in the fight against the theft, loss and misuse of information.
Nicko van Dec 6 2006 9:57PM Security
Training to nullify the insider threat

Training to nullify the insider threat

In the last decade, the security of your information on your networks has been focused on protecting the integrity of data from outsiders. Much of the effort has been based on perimeter security - from outsiders trying to break into the network.
Angus MacDonald, Dec 6 2006 9:06PM Security
Hot or not: Holiday threats

Hot or not: Holiday threats

The holiday season is officially underway. Retailers are bustling around to display choice merchandise, while consumers are busy spending. With businesses focused on meeting their end-of-year sales goals and planning for 2007, security may not be a top priority, which can be a costly mistake.
Jennifer Mack, Dec 6 2006 8:49PM Security
A network security strategy for the age of terrorism

A network security strategy for the age of terrorism

Just as bacteria evolve around the technological barriers we put in their place, so too do the tactics and strategies employed by computer attackers. When a security measure is put in place, our enemies immediately set out to exploit its weakness. When they are repelled, they adapt their tactics and strategies, regroup and come back yet again.
G. Robert Dec 5 2006 6:42PM Security
Laptop theft, data exposure the result of poor mobile security management

Laptop theft, data exposure the result of poor mobile security management

Hearing news about yet another lost or stolen laptop and exposure of personal information is almost like having seen too many horror flicks. Shock has shifted to disbelief - plus numb outrage at the apparent inability of corporations and government to protect our private personal data.
Peter Larsson, Dec 5 2006 11:00AM Security
Image spam still growing as threat to email security

Image spam still growing as threat to email security

Today one out of four emails on the internet is an image spam message. This is not because spammers have just realised the marketing benefits of captive colours. Instead, this is because the spammers have identified a weakness in many anti-spam systems and are moving diligently to maximise this opportunity by fully exploiting this weakness.
Paul Judge, Dec 5 2006 10:00AM Security
Review: Symantec IM Manager

Review: Symantec IM Manager

Symantec IM Manager offers instant messaging management and security with support for public IM networks and enterprise IM platforms including AOL, Jabber, IBM Lotus Instant Messaging, ICQ, MSN Messenger, Microsoft Live Communications Server, Reuters, Yahoo! and GoogleTalk.
René Millman Dec 5 2006 9:00AM Security
Patch management doesn't begin or end on Patch Tuesday

Patch management doesn't begin or end on Patch Tuesday

Many organisations appreciate the regularity of Patch Tuesday to better prepare and execute patch deployment. However, few organisations use the time prior to Patch Tuesday to efficiently prepare systems and people for rapid deployment.
Chris Andrew, Dec 5 2006 9:00AM Security
Hot or not: Network embedded device security threats

Hot or not: Network embedded device security threats

Hot: Expect attackers to increasingly target networked, multifunction devices, such as high-end printers, scanners and fax machines, as these devices continue to grow more sophisticated and move away from proprietary operating systems and software.
Amol Sarwate, Dec 5 2006 9:00AM Security
No time for declarations of victory over compliance deadlines

No time for declarations of victory over compliance deadlines

US Financial institutions that meet the Federal Financial Institutions Examination Council's (FFIEC) year-end compliance guidance for stronger customer data and transaction protection will be wise not to declare victory.
Arthur W. Dec 5 2006 9:00AM Security
Review: Nortel VPN Gateway 3050

Review: Nortel VPN Gateway 3050

Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ourselves looking through different guides trying to locate configuration information. The absence of a quickstart card or a getting started guide makes this task even more difficult.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 1 2006 12:00AM Security

Log In

  |  Forgot your password?