Features

Opinion: Make mobile working safer

Opinion: Make mobile working safer

Higher productivity, cost savings and faster access to information are the benefits of a mobile workforce. But the growth of technology and the potential threats to corporate networks have caused fear and confusion.
David Lannin, Oct 2 2006 2:48PM Security
Editorial: Security boosts your brand

Editorial: Security boosts your brand

How often does the word "brand" pop up in conversations with your fellow professionals? I'd stick out my neck and say hardly ever.
Paul Fisher Oct 2 2006 2:48PM Security
Review: StillSecure StrataGuard Free

Review: StillSecure StrataGuard Free

As its name implies, this is a free version of the StillSecure StrataGuard intrusion detection system (IDS) and intrusion prevention system (IPS) products. The software lacks some features present in the commercial versions, such as automatic rule updating and individual device protection, but none of these limitations need be a problem for its target audience, the small business and individual user.
Peter Stephenson,CeRNS, Oct 1 2006 12:00AM Security
Review: Lockdown Enforcer

Review: Lockdown Enforcer

There are many approaches one could take to securing the network, with equally many tools available for each aspect of security. However, if undertaken on a blow-by-blow basis, one can unwittingly construct quite a complex arrangement of tools and service, which, in turn, brings complexity to the administration and support of the task itself.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Global Command Center

Review: Global Command Center

The Global Command Center (GCC) from Secure Computing is a serious tool that will appeal to those with a large or complex network to administer and who seek a fine level of configuration and control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Security Center Lite

Review: Security Center Lite

There are many approaches to vulnerability scanning and intrusion detection, depending upon the scale of your enterprise and the lengths to which you wish to go. Security Center Lite offers a relatively low-cost introduction to such tasks for infrastructures with up to 100 network nodes. For larger organisations, Security Center Pro can support an unlimited number of network nodes.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: SonicWall SSL VPN 2000

Review: SonicWall SSL VPN 2000

Once the interfaces are configured for the network in a quick and easy setup process, the SonicWall appliance is administrated via the web interface. This interface starts with the system dashboard, which shows all system information in a user-friendly layout. The web interface organises all tasks on the left side of the screen in several tabs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: webNetwork

Review: webNetwork

Although this product is easy to use, it requires a lot of configuration. The main program is set up on a server via a simple-to-use wizard. Once installed, its interface is organized with a clumsy tree menu to the left and a configuration menu on the right. The menus can be confusing and awkward to work with.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: AirMagnet Enterprise

Review: AirMagnet Enterprise

AirMagnet is unusual in that it specialises in protecting wireless LANs, a very pertinent capability given the proliferation of wireless devices in the enterprise and the security headaches this can bring. The company's approach is also quite novel in that specialist hardware-based sensors are deployed and networked back to a software-based management server.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Aventail ST2

Review: Aventail ST2

Setup for the Aventail ST2 is simple. You just have to configure the interface through a console connection and you can access the web-based setup wizard. This is easy to follow and guides you through the creation of the administrator account.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Caymas 318

Review: Caymas 318

Designed for use on the Java platform, Caymas Systems' offering in this category has a web interface called the Launchpad. This is intuitive, easy to navigate and well organised. We had no trouble at all setting up users and creating user access policies. Generally, this appliance boasts the types of features that administrators like. It is easy to set up and maintain and requires little ongoing maintenance once it is in operation.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Centrify DirectControl

Review: Centrify DirectControl

Centrify is a fairly young company, founded in 2004, but the problem its products seek to address goes back further than this. It is the perennial issue of providing an integrated and centralised approach to access control across disparate platforms, such as Windows, Unix, Linux and Mac. The issue is heightened by regulatory compliance obligations and associated audit requirements. Organisations with a large, mixed infrastructure can find themselves with a heavy workload in order to meet requirements in this context.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Connectra

Review: Connectra

Check Point's appliance allows for both web- and network-based SSL connections via a web browser. It allows users to access information through its own, customisable web portal. The range of applications users can access include web-based applications and resources, shared files and email. The Connectra also incorporates its own intrusion prevention system, which provides extra security.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: AEP Netilla Security Platform

Review: AEP Netilla Security Platform

We found this product to be simple to set up and use. The initial configuration is done via a serial connection, using the command line. This includes choosing the device's network and name settings. Once the device has an internet provider, it can then be administrated via the web interface. The web GUI is simple and stripped down, consisting of a main tree menu on the left and a display window on the right. The menu is easy to navigate and quite intuitive.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
New "extremely critical," unpatched flaw in Microsoft Office reported

New "extremely critical," unpatched flaw in Microsoft Office reported

Security experts are warning today of a trojan that is actively exploiting a new, unpatched Microsoft Word zero-day vulnerability.
Dan Kaplan Sep 5 2006 6:15PM Security
Letter: Compliance on a budget

Letter: Compliance on a budget

Ian Cook makes some interesting points in his article regarding the need for companies to employ an holistic combination of procedures and processes when looking into appropriate storage solutions (SC Guide to Compliance, July).
Staff Writers Sep 4 2006 3:56PM Security
Letter: Left phishing for answers

Letter: Left phishing for answers

I find the ThreatStats extremely useful as a tool to show senior management that we have our fingers on the pulse at all times. Statistics are wonderful things, but I was at a loss to explain the phishing figures as published in the July issue.
Staff Writers Sep 4 2006 3:56PM Security
Interview: Ed Gibson

Interview: Ed Gibson

Who better to protect your company's assets than a former FBI agent? Microsoft's chief security adviser tells Paul Fisher about life as a civilian.
Staff Writers Sep 4 2006 3:56PM Security
Pen testing: Access denied

Pen testing: Access denied

How can you be sure your security works unless someone tried to crack it - and failed? Rob Buckley delves into the world of penetration testing.
Staff Writers Sep 4 2006 3:56PM Security
VoIP: Can we talk?

VoIP: Can we talk?

VoIP cuts costs and streamlines communication for enterprises, but are the benefits worth the security risks? Dan Kaplan investigates.
Staff Writers Sep 4 2006 3:56PM Security

Log In

  |  Forgot your password?