Features

Review: Sidewinder G2 1100C

Review: Sidewinder G2 1100C

The Sidewinder G2 is a powerful multi-function security tool, but requires some experience to get really comfortable with its management.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: VPN-1 UTM Edge Appliance

Review: VPN-1 UTM Edge Appliance

This is a user-friendly gateway-style appliance. Installation is made simple by an easy-to-follow setup wizard that sets up the initial port configuration for connecting to the internet and licensing the product. After setup, the intuitive web interface is used for all policy and device management.
Peter Stephenson,CeRNS, Aug 10 2006 12:00AM Security
Review: DFL-M510

Review: DFL-M510

The DFL-M510 is extremely easy to use. Take it out of the box, plug it in, log in to the Java-based web interface and follow the setup wizard for a quick, seamless installation into the network. Once the device is set up, the management interface becomes a one-stop shop for system and policy management, as well as for generating monitors, logs, and reports.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: Finjan Vital Security Web Appliance NG-5100

Review: Finjan Vital Security Web Appliance NG-5100

This appliance is in-depth and focused on malware, lacking VPN and IDS/IPS capabilities. The configurations are granular and take a lot of time to put in place. While the setup and installation of the NG-5100 are very simple, configuration is not an easy task. That said, documentation plays a large role in making the configuration process much less arduous.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: FortiGate-300A

Review: FortiGate-300A

We found this product reasonably simple to use. The web interface is easy to navigate and is laid out in an organised manner. But configuring the ports properly and setting up the initial configuration and policies was a little confusing.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: InstaGate PRO

Review: InstaGate PRO

This product is feature-rich and especially easy to use and administrate. Setting it up is as simple as taking it out of the box and plugging it in. It is then configured using the simple web interface-based setup wizard.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: NETASQ F800 UTM Appliance

Review: NETASQ F800 UTM Appliance

The NETASQ F800 appears to have a simple setup, but configuration was another story. After going through a setup procedure that involves changing IP addresses of its interfaces and the management computer, the appliance then has to be licenced.
Peter Stephenson,CeRNS, Aug 9 2006 12:00AM Security
Review: Dekart Private Disk

Review: Dekart Private Disk

Dekart’s approach to encryption is innovative, albeit using accepted standards where appropriate. The company offers a range of useful security-related products and utilities, within which Private Disk plays an important part.
Julian Ashbourn Aug 9 2006 12:00AM Security
Review: DeskCrypt

Review: DeskCrypt

One of the issues with software encryption systems is that you have to take care to have all the relevant software elements, certificates and so on precisely configured and in place. One little slip-up and you may find yourself locked out of your own data.
Julian Ashbourn Aug 9 2006 12:00AM Security
Cover story: Coming up roses

Cover story: Coming up roses

If the online marketplace were a family, 1-800-flowers.com could be considered a patriarch. In 1992, the flower distribution business joined AOL as the internet service provider's first merchant. Three years later, the company added a ".com" to its name and became one of the web's earliest and most recognizable success stories.
Dan Kaplan Aug 8 2006 10:27PM Security
Dealing with disaster

Dealing with disaster

It's every executive's nightmare. After several days of heavy rain and unexpected flooding, the office is drenched in water and the IT infrastructure is almost a total loss.
Frank Washkuch Aug 8 2006 10:10PM Security
Can we talk?

Can we talk?

Ma Bell, meet your precocious newborn, Voice over Internet Protocol (VoIP). The technology, just a few years old, is growing up fast as enterprises and home users abandon traditional telephone lines so they can converge voice and data communication onto one network — while significantly cutting costs in the process.
Dan Kaplan Aug 8 2006 9:56PM Security
Cultivating good code

Cultivating good code

If there is one incontrovertible truth about software development, it's that there is no way to write perfect code. No matter what developers do to get rid of bugs and vulnerabilities, experts believe they will always make coding mistakes that will be overlooked before the program goes out the door.
Ericka Chickowski Aug 8 2006 9:45PM Security
The coming storm

The coming storm

Ask IT security experts to forecast the future of mobile device security, and their crystal ball might become a little murky — possibly because of looming storms on the horizon.
Frank Washkuch Aug 8 2006 9:28PM Security
House advantage

House advantage

Nothing says "good fortune" louder than the clatter of coins cascading into the winner's tray of a slot machine. But these days that jangle is nothing more than set dressing. Instead of bucketfuls of quarters, lucky gamblers are rewarded with the pre-recorded sound of falling coins and a printed voucher for their booty.
Ericka Chickowski Aug 8 2006 9:14PM Security
Review: CounterACT

Review: CounterACT

This product has a simple, straightforward setup and initial configuration, and generally, we found it easy to work with. Understanding the console takes some reading of the documentation, though. ForeScout uses many non-traditional icons and the interface can be confusing to start with, but the console user guide is very helpful in explaining how to use the interface.
Peter Stephenson,CeRNS, Aug 8 2006 12:00AM Security
On compliance: Get a step-by-step plan for meeting PCI standards

On compliance: Get a step-by-step plan for meeting PCI standards

At first glance, achieving compliance for all 12 payment card industry (PCI) security requirements may seem daunting. But, when we break down the requirements and examine the common issues, the process becomes quite manageable.
Bill Conner, Aug 7 2006 10:52PM Security
CISOs are only part of the plan

CISOs are only part of the plan

Can CISOs and CSOs make a difference in the companies for which they work? Can they shape a successful IT security program that promotes a flourishing, trusted and respected business? And, in the end, does it really matter if a company has a lead professional in place to oversee and usher in IT security practices, or can a company do without yet still maintain a strong IT security posture that begets consumer and investor confidence?
Illena Armstrong Aug 7 2006 9:53PM Security
News briefs

News briefs

More military woes The personal information of about 28,000 U.S. Navy sailors and their family members was posted on a public website, a month after the personal data of 26.5 million veterans and active duty military personnel was compromised. Chief of Navy Personnel J.C. Harvey Jr. was told that an unnamed website hosted five data spreadsheets containing personal information on several Navy members and dependents. All of the affected personnel were stationed in areas devastated by Hurricane Katrina in 2005, according to the Navy's website.
Staff Writers Aug 7 2006 9:48PM Security
Debate: Congress should make data breach legislation a priority

Debate: Congress should make data breach legislation a priority

Congress should make data breach legislation a priority.
Bill Geime, Aug 7 2006 9:31PM Security

Log In

  |  Forgot your password?