Features

Infected MP3 players: Is your business at risk?

Infected MP3 players: Is your business at risk?

Two of the world's most recognised brands, McDonalds and Apple Computer were connected to unknowingly selling virus infected MP3 players, last month. What happened, how will it affect your business, and who’s to blame? Negar Salek investigates.
Negar Salek Oct 31 2006 1:25PM Security
Hot or not: Wireless card attacks

Hot or not: Wireless card attacks

The recent controversy at this year's Black Hat security conference highlighted a growing trend in vulnerability research and reporting — the inability of some to make a distinction between technically interesting, novelty attacks versus real threats.
Marc Maiffret, Oct 24 2006 10:52PM Security
Mobile security dialing up investment dollars

Mobile security dialing up investment dollars

The mobile, wireless world in which we now live has created a shift in the focus of venture capital investments in security technology. Today's investors tend to target technology that directly protects people and information, a marked change from a few years ago when the focus was the protection of corporate computer systems as a whole.
Deborah Magid, Oct 24 2006 4:04PM Security
Crime watch: What the world's top experts think you should be worried about

Crime watch: What the world's top experts think you should be worried about

Nine experts from Australia and around the world sound off on where security threats are headed, and what we can do about it. Negar Salek asks the experts for advice.
Negar Salek Oct 23 2006 12:16PM Security
Making the right moves for advancement

Making the right moves for advancement

In one of our features this month, "2006: Year of exposed IDs," we discuss the various breaches that have plagued businesses of all sizes over the last year. As our edition went to press, still other incidents cropped up.
Illena Armstrong Oct 17 2006 8:54PM Security
Beyond patch management

Beyond patch management

During my recent conversations with industry analysts about evolving security threats, the issue of security settings has become a main topic of discussion. Initially, anti-virus was adequate enough to protect systems from outside threats, but it soon became a service with a continual addition of virus signatures.
Vijay Adusumilli, Oct 16 2006 10:26PM Security
VoIP: The new threat

VoIP: The new threat

VoIP cuts costs and streamlines communication for enterprises, but are the benefits worth the security risks? Dan Kaplan and Negar Salek investigate
Negar Salek , Dan Kaplan Oct 16 2006 6:23PM Security
Review: SEM3210

Review: SEM3210

High Tower pre-configures all the equipment before it is shipped to the end-user, so when the appliance arrives there are just a few simple steps to complete before it is online and ready to go. We found this product to be quite simple to use, thanks to the intuitive user interface that includes an easy-to-read dashboard-type console. We were impressed by the clean look of all parts of the console. This product displays a lot of vital information in one place in a clear manner.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 11 2006 12:00AM Security
Opinion: Make mobile working safer

Opinion: Make mobile working safer

Higher productivity, cost savings and faster access to information are the benefits of a mobile workforce. But the growth of technology and the potential threats to corporate networks have caused fear and confusion.
David Lannin, Oct 2 2006 2:48PM Security
Editorial: Security boosts your brand

Editorial: Security boosts your brand

How often does the word "brand" pop up in conversations with your fellow professionals? I'd stick out my neck and say hardly ever.
Paul Fisher Oct 2 2006 2:48PM Security
Review: StillSecure StrataGuard Free

Review: StillSecure StrataGuard Free

As its name implies, this is a free version of the StillSecure StrataGuard intrusion detection system (IDS) and intrusion prevention system (IPS) products. The software lacks some features present in the commercial versions, such as automatic rule updating and individual device protection, but none of these limitations need be a problem for its target audience, the small business and individual user.
Peter Stephenson,CeRNS, Oct 1 2006 12:00AM Security
Review: Global Command Center

Review: Global Command Center

The Global Command Center (GCC) from Secure Computing is a serious tool that will appeal to those with a large or complex network to administer and who seek a fine level of configuration and control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Security Center Lite

Review: Security Center Lite

There are many approaches to vulnerability scanning and intrusion detection, depending upon the scale of your enterprise and the lengths to which you wish to go. Security Center Lite offers a relatively low-cost introduction to such tasks for infrastructures with up to 100 network nodes. For larger organisations, Security Center Pro can support an unlimited number of network nodes.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: SonicWall SSL VPN 2000

Review: SonicWall SSL VPN 2000

Once the interfaces are configured for the network in a quick and easy setup process, the SonicWall appliance is administrated via the web interface. This interface starts with the system dashboard, which shows all system information in a user-friendly layout. The web interface organises all tasks on the left side of the screen in several tabs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: webNetwork

Review: webNetwork

Although this product is easy to use, it requires a lot of configuration. The main program is set up on a server via a simple-to-use wizard. Once installed, its interface is organized with a clumsy tree menu to the left and a configuration menu on the right. The menus can be confusing and awkward to work with.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: AirMagnet Enterprise

Review: AirMagnet Enterprise

AirMagnet is unusual in that it specialises in protecting wireless LANs, a very pertinent capability given the proliferation of wireless devices in the enterprise and the security headaches this can bring. The company's approach is also quite novel in that specialist hardware-based sensors are deployed and networked back to a software-based management server.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Aventail ST2

Review: Aventail ST2

Setup for the Aventail ST2 is simple. You just have to configure the interface through a console connection and you can access the web-based setup wizard. This is easy to follow and guides you through the creation of the administrator account.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Caymas 318

Review: Caymas 318

Designed for use on the Java platform, Caymas Systems' offering in this category has a web interface called the Launchpad. This is intuitive, easy to navigate and well organised. We had no trouble at all setting up users and creating user access policies. Generally, this appliance boasts the types of features that administrators like. It is easy to set up and maintain and requires little ongoing maintenance once it is in operation.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Centrify DirectControl

Review: Centrify DirectControl

Centrify is a fairly young company, founded in 2004, but the problem its products seek to address goes back further than this. It is the perennial issue of providing an integrated and centralised approach to access control across disparate platforms, such as Windows, Unix, Linux and Mac. The issue is heightened by regulatory compliance obligations and associated audit requirements. Organisations with a large, mixed infrastructure can find themselves with a heavy workload in order to meet requirements in this context.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Connectra

Review: Connectra

Check Point's appliance allows for both web- and network-based SSL connections via a web browser. It allows users to access information through its own, customisable web portal. The range of applications users can access include web-based applications and resources, shared files and email. The Connectra also incorporates its own intrusion prevention system, which provides extra security.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security

Log In

  |  Forgot your password?