Features

Industry views: Who's stealing your brand name?

Industry views: Who's stealing your brand name?

It has been estimated that there are US$50 billion of illegal counterfeit and gray market goods sold on the internet annually and with the amazing growth in popularity of online auction sites and business-to-business (B2B) exchanges, all indications are that this trend is going to get worse before it gets better.
Laura Mather, Nov 21 2006 10:23PM Security
Editorial: People will always be the weakest link

Editorial: People will always be the weakest link

At the recent RSA conference Europe, the final keynote speaker was the former politician and governor of Hong Kong, Chris Patten.
Paul Fisher, Nov 20 2006 1:31PM Security
Two become one: Making sense of storage and security convergence

Two become one: Making sense of storage and security convergence

The merging of two IT industries always leads to the formation of a new buzzword, followed by a period of furious head-scratching as to what exactly it means. Integrators and their customers are best advised to wait on the sidelines until the dust settles, standards are set and commodification, that harbinger of good value, arrives.
Sholto Macpherson Nov 15 2006 10:46AM Storage
Market heats up after feeding frenzy

Market heats up after feeding frenzy

In an industry swimming with fish of all sizes, 2006 will remembered as the year in which the storage predators went to lunch. After its multi-billion dollar purchase of industry leader RSA Security, EMC is looking like the cat that got the cream.
Sholto Macpherson Nov 15 2006 10:43AM Storage
MSSPs: At your service

MSSPs: At your service

With security becoming increasingly complex to manage, formerly reluctant organisations are embracing outsourcing, says Rob Buckley.
Rob Buckley Nov 13 2006 1:31PM Security
Interview: Patricia Sueltz, CEO of SurfControl

Interview: Patricia Sueltz, CEO of SurfControl

SurfControl's CEO may be a relative newcomer to the infosec world, but she is already pursuing an aggressive growth policy for the security vendor, Paul Fisher reports.
Paul Fisher Nov 13 2006 1:31PM Security
How are businesses facing up to the compliance challenge?

How are businesses facing up to the compliance challenge?

As businesses try to get to grips with an ever growing list of regulations, could the legislators actually be doing them a favour? I fought the law, and the law won - wise words indeed from The Clash, and the logic is indisputable. However, in the world of business compliance, not everything is black and white: what does your business need to comply with, and how? Will the process be a hindrance or a business boon?
Mark Mayne Nov 13 2006 1:31PM Security
Opinion: Remember: less can be more

Opinion: Remember: less can be more

Discussing the pros and cons of radio frequency identification (RFID), the technology that allows interaction between small chips and nearby readers without physical contact, is a surefire way to get a good argument going.
Nick Barron, Nov 13 2006 1:31PM Security
Interview: Mike Maddison

Interview: Mike Maddison

Deloitte's corporate logo has a very deliberate green full stop at the end. It suggests that what the company offers is backed up by solid expertise and decades of experience and thought. Potential clients need look no further. This is the complete package. End of story.
Paul Fisher Nov 9 2006 12:21PM Security
Industry views: Encryption certainly not going anywhere

Industry views: Encryption certainly not going anywhere

No one questions that email is universally adopted. It is in the mainstream. And despite the huge advantages of personal and corporate productivity, the open nature of the internet has made email vulnerable to interception and even alteration by malicious parties. As the risks to the privacy and security of email messaging have grown, so have efforts to protect it.
Scott Petry, Nov 7 2006 8:15PM Security
Clearing the hurdles to improved endpoint security

Clearing the hurdles to improved endpoint security

Today's workforce is more efficient than ever, utilising communications and storage devices that make the transfer of information fast and convenient. However, the time these tools save can be lost as a result of the data security risks the devices pose for the companies that use them.
Gil Sever, Nov 2 2006 7:08PM Security
Using proper standards for organisational security

Using proper standards for organisational security

In the last couple of years, the role of the information security function in many organisations has achieved recognition as an important component of the organisation's overall risk management strategy.
Rudy Bakalov, Nov 1 2006 10:04PM Security
Take a proactive approach to email security

Take a proactive approach to email security

Anti-spam and anti-virus are undeniable necessities, but today's threat landscape has changed, requiring multiple layers of security technologies to keep business-critical email flowing. Email security is more than simply anti-spam and anti-virus. It's time to put true preemptive protection in email security.
Carsten Dietrich, Nov 1 2006 8:55PM Security
Review: FortiGate-500A-HD

Review: FortiGate-500A-HD

Fortinet's FortiGate-500A-HD appliance is another 1U rack-mountable unit but, being half-depth, is smaller than some similar products. It's claim to fame is as a "multi-zone network protection solution." Fortinet says it enables organizations to segment networks into independent security "zones", each with unique access and security policies.
René Millman Nov 1 2006 12:00AM Security
Review: GMS Instant Messaging

Review: GMS Instant Messaging

Gordano Message Suite is a stable of products that includes email, anti-spam, anti-virus, instant messenger and collaboration tools. We opted to install the full suite, but during installation we were able to pick and choose the applications we wanted.
René Millman Nov 1 2006 12:00AM Security
Review: GTB Inspector 10.0

Review: GTB Inspector 10.0

The GTB Inspector 10.0 is a different type of product from the others we looked at in this group test. While the other solutions, with one exception, focus on protecting documents at rest and in transit, GTB Technologies' offering is designed to prevent unauthorized outbound transmissions of confidential information in violation of the organization's corporate policies. This gives it a core capability of extrusion prevention as opposed to digital rights management in the traditional sense.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 1 2006 12:00AM Security
Review: secure2trust

Review: secure2trust

This impressive E-DRM application is a desktop product in that it requires no server and instead attaches document rights to the individual document. We like this product, and, despite weak support, rate this our enterprise Best Buy. Interestingly, secure2trust can be deployed as either a simple desktop DRM application or as a full-blown E-DRM system using the server to manage the clients over a large, distributed enterprise.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 1 2006 12:00AM Security
Review: LM Document Control v6

Review: LM Document Control v6

Liquid Machines Document Control Version 6 is an enterprise-scale application that allows users to manage documents both on- and offline. The user develops a document, applies a policy to it and then makes the document available to collaborators.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 1 2006 12:00AM Security
Review: Workshare Protect Enterprise

Review: Workshare Protect Enterprise

Workshare Protect Enterprise Suite is a big program for big organisations. It is a true large-scale extrusion prevention application. Successful deployment of this client/server application requires configuration of Microsoft Server 2003 and Microsoft SQL Server, as well as detailed knowledge of these platforms. However, once installed, it is easy to use and can be customised for many different conditions and controls.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 1 2006 12:00AM Security
Review: Pinion Desktop Packager

Review: Pinion Desktop Packager

Pinion's desktop package is a simple, individual user-oriented digital rights management program. We tested the Workgroup Edition.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 1 2006 12:00AM Security

Log In

  |  Forgot your password?