Features

Six simple steps to managing privileged passwords

Six simple steps to managing privileged passwords

One of today's biggest IT headaches is managing privileged passwords, the super-powerful codes such as administrator on a Windows server, Root on a UNIX server, Cisco Enable on a Cisco device, as well as embedded passwords found in applications and scripts.
Calum MacLeod, Mar 13 2007 4:00PM Security
Review: Lumigent Audit DB

Review: Lumigent Audit DB

For years vulnerability assessment and penetration tests have been less than effective at testing the security internal to a database. The Lumigent Audit DB product changes that.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: McAfee Hercules Policy Auditor

Review: McAfee Hercules Policy Auditor

The Hercules Policy Auditor and Remediation Manager were formerly known as Citadel Hercules. These products have one very unique feature in that they can process the output from popular vulnerability scanners.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: NetIQ Secure Config Manager

Review: NetIQ Secure Config Manager

NetIQ Secure Configuration Manager was one of the first products in the policy management space. It is also the most feature-rich solution tested.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: CyberGatekeeper WITH DNAC

Review: CyberGatekeeper WITH DNAC

CyberGatekeeper with dynamic network access control (DNAC) was one of the more challenging products to work with in the review process.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: GPAnywhere

Review: GPAnywhere

GPAnywhere essentially works by installing an extension into the Microsoft Windows 2003 Global Policy Management Client.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
A slow start for virtualisation

A slow start for virtualisation

Fear and indifference are retarding the spread of virtualisation technology in Australian SMEs, despite glowing reviews.

Sholto Macpherson Mar 7 2007 4:23PM Software
Protecting the enterprise in a Vista environment

Protecting the enterprise in a Vista environment

Microsoft’s new Vista operating system has placed more emphasis on security than any previous version of Windows.
Paul Henry Mar 7 2007 10:50AM Security
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

MIMESweeper has been around for a long time. Available in four configurations to support up to a maximum of 3,000 users, the appliance has a moderate level of features. This makes it suitable for small and medium-sized organisations only.
Peter Stephenson, Mar 5 2007 5:00AM Security
Review: AEP Networks SmartGate

Review: AEP Networks SmartGate

AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the OSI model. The product is similar to a typical SSL VPN, but with added authentication components that make the user’s authentication tunnel more secure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

SurfControl is, arguably, the granddaddy of the web content filtering class. Supplied as software, this product requires its own server platform running Microsoft Windows Server 2003 and SQLServer. Its straightforward drag-and-drop rules engine makes policy creation easy. However, deployment, setup, and configuration were a bit more demanding than for similar products.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
10 ways to protect intellectual property

10 ways to protect intellectual property

Intellectual property (IP) assets are at the heart of businesses. Increasingly these assets are available in digital formats: Microsoft Word files, Excel spreadsheets etc, making them easy targets.
Ratinder Paul Feb 28 2007 3:21PM Security
Document security: Safe words

Document security: Safe words

Choosing the right content management system is crucial to keeping your digital files secure. But it's only the first step. Rob Buckley reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Interview: Tomas Olovsson

Interview: Tomas Olovsson

Why the co-founder and CTO of AppGate came up with a solution for deperimeterisation before anyone had ever heard of it.
Paul Fisher Feb 28 2007 2:27PM Security
Peer-to-peer: Shared property security pay

Peer-to-peer: Shared property security pay

P2P is here to stay, so shore up your defences and embrace the technology's potential for a distributed architecture.
Mark Mayne Feb 28 2007 2:27PM Security
XSS is a large problem

XSS is a large problem

Seen as an end-user issue, cross-site scripting has been ignored for too long. Now attacks are on the rise.
Ken Munro Feb 28 2007 2:27PM Security
Legal matters: Outsourcing and the law

Legal matters: Outsourcing and the law

Always clarify in outsourcing deals who is liable for data security, advises Tamzin Matthew.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Opinion: Caught between yes and no

Opinion: Caught between yes and no

CIOs are blamed either for being unable to deliver on commitments, or for creating roadblocks hampering business development.
Staff Writers Feb 27 2007 12:51PM Security
Accelerating the path to WAN optimisation

Accelerating the path to WAN optimisation

In today’s fast-paced and technologically-driven environment, the need for instant real-time communication is critical for any business to remain competitive. It is not unusual for offices in Australia to exchange information with locations around the world on a daily basis.
Wayne Neich Feb 26 2007 2:58PM Security

Log In

  |  Forgot your password?