Features

Review: Lumigent Audit DB

Review: Lumigent Audit DB

For years vulnerability assessment and penetration tests have been less than effective at testing the security internal to a database. The Lumigent Audit DB product changes that.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: McAfee Hercules Policy Auditor

Review: McAfee Hercules Policy Auditor

The Hercules Policy Auditor and Remediation Manager were formerly known as Citadel Hercules. These products have one very unique feature in that they can process the output from popular vulnerability scanners.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Review: NetIQ Secure Config Manager

Review: NetIQ Secure Config Manager

NetIQ Secure Configuration Manager was one of the first products in the policy management space. It is also the most feature-rich solution tested.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Mobile security: Tips and tricks to protect business from threats

Mobile security: Tips and tricks to protect business from threats

Anyone that’s ever had the less-than-pleasant experience of being cooped up in a cab with a taxi driver intent on educating you about the state of the world will surely tell you that when it comes to useful insights and analysis, cab drivers are not the best place to turn.
Simon Sharwood Mar 12 2007 11:41AM Security
A slow start for virtualisation

A slow start for virtualisation

Fear and indifference are retarding the spread of virtualisation technology in Australian SMEs, despite glowing reviews.

Sholto Macpherson Mar 7 2007 4:23PM Software
Protecting the enterprise in a Vista environment

Protecting the enterprise in a Vista environment

Microsoft’s new Vista operating system has placed more emphasis on security than any previous version of Windows.
Paul Henry Mar 7 2007 10:50AM Security
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

MIMESweeper has been around for a long time. Available in four configurations to support up to a maximum of 3,000 users, the appliance has a moderate level of features. This makes it suitable for small and medium-sized organisations only.
Peter Stephenson, Mar 5 2007 5:00AM Security
Review: AEP Networks SmartGate

Review: AEP Networks SmartGate

AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the OSI model. The product is similar to a typical SSL VPN, but with added authentication components that make the user’s authentication tunnel more secure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

SurfControl is, arguably, the granddaddy of the web content filtering class. Supplied as software, this product requires its own server platform running Microsoft Windows Server 2003 and SQLServer. Its straightforward drag-and-drop rules engine makes policy creation easy. However, deployment, setup, and configuration were a bit more demanding than for similar products.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
10 ways to protect intellectual property

10 ways to protect intellectual property

Intellectual property (IP) assets are at the heart of businesses. Increasingly these assets are available in digital formats: Microsoft Word files, Excel spreadsheets etc, making them easy targets.
Ratinder Paul Feb 28 2007 3:21PM Security
Document security: Safe words

Document security: Safe words

Choosing the right content management system is crucial to keeping your digital files secure. But it's only the first step. Rob Buckley reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Interview: Tomas Olovsson

Interview: Tomas Olovsson

Why the co-founder and CTO of AppGate came up with a solution for deperimeterisation before anyone had ever heard of it.
Paul Fisher Feb 28 2007 2:27PM Security
Peer-to-peer: Shared property security pay

Peer-to-peer: Shared property security pay

P2P is here to stay, so shore up your defences and embrace the technology's potential for a distributed architecture.
Mark Mayne Feb 28 2007 2:27PM Security
XSS is a large problem

XSS is a large problem

Seen as an end-user issue, cross-site scripting has been ignored for too long. Now attacks are on the rise.
Ken Munro Feb 28 2007 2:27PM Security
Legal matters: Outsourcing and the law

Legal matters: Outsourcing and the law

Always clarify in outsourcing deals who is liable for data security, advises Tamzin Matthew.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 28 2007 2:27PM Security
Opinion: Caught between yes and no

Opinion: Caught between yes and no

CIOs are blamed either for being unable to deliver on commitments, or for creating roadblocks hampering business development.
Staff Writers Feb 27 2007 12:51PM Security
Accelerating the path to WAN optimisation

Accelerating the path to WAN optimisation

In today’s fast-paced and technologically-driven environment, the need for instant real-time communication is critical for any business to remain competitive. It is not unusual for offices in Australia to exchange information with locations around the world on a daily basis.
Wayne Neich Feb 26 2007 2:58PM Security
Passwords management for UNIX and Linux systems

Passwords management for UNIX and Linux systems

An unhappy systems administrator who may want to teach a seemingly unappreciative company a lesson. An employee who is passed over for a promotion or a raise. An IT manager who is disappointed by a bonus. A technically savvy database administrator willing to change information in the Oracle Financial Suite for a CEO whose future is riding on the next stock analyst's recommendation.
Ellen Libenson, Feb 26 2007 7:12AM Security
Growing number of SMBs going 'in the cloud'

Growing number of SMBs going 'in the cloud'

On-demand security services, or "in the cloud" services, refer to security technology that is managed from a central location and delivered over the Internet, eliminating the need for small to medium sized businesses (SMBs) to deal with the high costs of hardware deployment, software upkeep and future scalability.
Anthony Pitpit, Feb 26 2007 6:26AM Security
Evolution of employee monitoring stretches far beyond email

Evolution of employee monitoring stretches far beyond email

The concept of organisations keeping a watchful eye on employees during company hours is nothing new.
Sandra Vaughan, Feb 26 2007 5:35AM Security

Log In

  |  Forgot your password?