Features

Meet your attackers on their own own turf

Meet your attackers on their own own turf

There’s plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications.
Todd Bransford Jun 5 2006 8:28PM Security
Review: RFprotect Endpoint

Review: RFprotect Endpoint

Despite the name, this is not similar to the endpoint products in this month’s endpoint security group test, hence its inclusion here on its own.
Jon Tullett Jun 1 2006 12:00AM Security
Review: UTM Plus

Review: UTM Plus

Network Box offers hosted security services based on its own custom appliances installed locally on end users’ networks. The company has a range of services designed to meet the requirements of firms of all sizes – from small home office users to large corporate enterprises.
Jon Tullett Jun 1 2006 12:00AM Security
Review: Spectator Professional

Review: Spectator Professional

Promisec’s Spectator Professional software combines the functionality of an appliance with the simplicity of standalone software.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: Safe Access

Review: Safe Access

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: LANDesk Security Suite

Review: LANDesk Security Suite

This product incorporates all the features of a great endpoint security product in one program. LANDesk must be installed on a central server, which must pass certain security and version tests before install will begin. After installation, policies can be set for access, applications, software versions, service packs, anti-virus, and so on. Agents planted across the network also allow the console administrator to take remote control of machines in violation of policies. Security Suite is part of a larger set of integrated products.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: AppSense Application Manager and Environment Manager

Review: AppSense Application Manager and Environment Manager

The AppSense Application Manager (AM) can be set up as a standalone product in a test environment before actual deployment. The standalone preconfiguration enables an administrator to get to know and tweak the program for the best configuration for each particular environment.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Dial M for Mobile Authentication

Dial M for Mobile Authentication

Recent efforts by the financial services industry to reduce the extent of credit card fraud are starting to pay off.
Paul Meadowcroft May 24 2006 11:35AM Security
Review: Configuresoft ECM and SUM

Review: Configuresoft ECM and SUM

Configuresoft’s Enterprise Configuration Manager (ECM) is a management application for configuration, patching, security, audit and compliance – and all from a single, very scalable console view.
Jon Tullett May 12 2006 12:00AM Security
Review: Skybox View 2.5

Review: Skybox View 2.5

This suite of security risk management applications contains components that analyze networks for vulnerabilities, identify risks, spot anomalous activity and report on it, raise alerts and track mitigation, then map the whole lot back to a set of business processes and risk models.
Jon Tullett May 12 2006 12:00AM Security
Cashing in on misconfigured systems

Cashing in on misconfigured systems

It’s not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other online activities, such as spam, is staggering. One only has to look at the recent case of Christopher William Smith, who allegedly made over $20 million illegally selling prescription drugs through spam emails.
Illena Armstrong May 10 2006 8:10PM Security
News briefs

News briefs

The uproar over foreign control over American interests was blamed for the break-up of one nearly successful IT security merger. Check Point Software Technologies Ltd., which is based in Israel, and Maryland-based Sourcefire broke off a $225 million merger that came under intense scrutiny by the Committee on Foreign Investment in the United States (CFIUS). “Basically we agreed to withdraw applications based on a couple of things,” said Michelle Perry, chief marketing officer for Sourcefire. “First the complexities of the overall CFIUS process, the lengthy ongoing delays and the current climate for international acquisitions.
Staff Writers May 10 2006 8:09PM Security
Debate

Debate

NBA systems are the most effective solutions for stopping worms and viruses.
Adam Powers May 10 2006 8:08PM Security
Company news

Company news

Kevin Prince has joined Perimeter Internetworking as chief security officer. Prince will help formulate the managed network security firm’s strategic and product development plans and oversee its strategic relationships. Prince previously founded Red Cliff Solutions and he currently trains federal examiners on security topics such as firewalls, intrusion detection and prevention, and remote access. www.perimeterusa.com
Staff Writers May 10 2006 8:07PM Security
2 minutes on ... Is FISMA effective?

2 minutes on ... Is FISMA effective?

Some believe it is nothing more than a paper exercise. The government earned poor marks on information security this year. Of the 24 agencies graded, seven agencies failed outright and, overall, agencies received an average grade of D+.
Ericka Chickowski May 10 2006 8:07PM Security
Me and my job

Me and my job

How did you get into security? In my case, the question could be phrased, "How did security get into you?" I am not an infosec professional in the usual sense, but rather a business manager with infosec responsibility. I manage business and product development and information security, which is a central thread that composes the fabric of our product offerings.
Aaron Bills May 10 2006 8:07PM Security
Open, transparent and safe?

Open, transparent and safe?

Business in the Participation Age is all about engagement and collaboration. It’s about access, transparency and trust. Today, the isolationist approach to security – the notion of avoiding risk rather than mitigating it – is a surefire way to squash the opportunities and value being created on the network. To be competitive in today’s marketplace, companies must change their mindset and evolve their security culture.
Scott McNealy May 10 2006 8:06PM Security
On colleagues and support

On colleagues and support

We all have colleagues with whom we keep in touch. We all have colleagues who we call on from time to time for help when we run into knotty problems. And we all have organizations we turn to when we need specific advice. The trouble is that many of us do not mix those three groups to the benefit of our systems’ security, and we should.
Peter Stephenson,CeRNS, May 10 2006 8:05PM Security
Reduce risk through vendor onus

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
Richard Lawhorn May 10 2006 8:05PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers May 10 2006 8:04PM Security

Log In

  |  Forgot your password?