Features

Review: Sourcefire 3D IPS1000

Review: Sourcefire 3D IPS1000

The Sourcefire box does all the things an IPS should do. It fits comfortably in the category of an average IPS, although it must be remembered that the Sourcefire 3D Suite includes a ton of IDS, scanning, and vulnerability management capability which falls outside the context of this review. As an IPS, the box has no standout features, and nothing specifically separates it from other IPSs.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sentivist Real Time Threat Protection System

Review: Sentivist Real Time Threat Protection System

NFR is one of the pioneers in intrusion detection and prevention, and its pedigree shows in this product.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Reflex IPS100

Review: Reflex IPS100

Reflex’s IPS100 is loaded with features. It gives a thorough inspection to all network traffic, and can also be used to filter certain traffic. The device operates inline and examines for both external as well as internal threats.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Nortel Threat Protection System

Review: Nortel Threat Protection System

The Nortel Threat Protection System runs on a Sourcefire platform, something that surprised us. The product is a flexible system composed of multiple sensors and a management console.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: ipANGEL

Review: ipANGEL

This device features real-time vulnerability discovery on the network and can tune and adapt its policies for the best protection. As it learns more about the network, it customises its defences for the environment.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: InstaGate PRO

Review: InstaGate PRO

The InstaGate has several interesting features. It can become more than just a firewall and IPS, as eSoft offers different software extensions, called SoftPaks. These include anti-virus, web filters, and IM and peer-to-peer filters. Apart from being an all-in-one device, it has a range of customisable reports and alert logs. It also includes several real-time monitors and keeps track of all internal and external activity.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: FortiGate-300A

Review: FortiGate-300A

The FortiGate-300A is a fullfunction front-end system for protecting a network in a way that goes far beyond intrusion prevention. It also has a built-in firewall and anti-virus protection as well as web filtering. Each port on the unit can be firewalled with specific rules and policies, allowing protected VLANs and isolated networks to be created.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Ally ip100

Review: Ally ip100

We were amazed at what this little product could do and how strong it was. When it first arrived, we did not believe that this little piece of plastic could be a functional IPS. We were wrong.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: ActiveScout

Review: ActiveScout

The ActiveScout appliance is a very basic intrusion prevention system that uses behaviour, not signatures to address a possible attack. It will identify whether the network is being scanned and then attempt to block the potential intrusion.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Your invitation to the SC Forum

Your invitation to the SC Forum

At the SC Magazine Forum, you could gain information, advice and great contacts to help you more readily achieve your goals as an IT security pro. Read on to see if you qualify for a free delegate place.
Staff Writers Apr 14 2006 8:14PM Security
IDM: Moving up

IDM: Moving up

Knowing who’s accessing what on enterprise networks that often lack defined perimeters is a necessity. So many company executives are trying to sort out the problems associated with establishing, controlling and terminating their employees’ various user rights.
Rene Millman Apr 14 2006 8:14PM Security
Raising information exchange

Raising information exchange

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s "The Black Book on Government Security," as part of an agreement with Larstan Publishing. This month’s excerpt will be available in an extended form on http://www.scmagazine.com.
Gregory N. Apr 14 2006 8:14PM Security
Cover story: Defining trust

Cover story: Defining trust

As the mastermind of the Bali nightclub bombings awaited execution, he published a jailhouse autobiography teaching others to follow in his footsteps.
Dan Kaplan Apr 14 2006 8:14PM Security
Controlling the endpoint

Controlling the endpoint

There’s yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), network access control (NAC), or network access protection (NAP), the main question is: Who has the real deal?
Jim Carr Apr 14 2006 8:14PM Security
Got something to say

Got something to say

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Apr 14 2006 8:14PM Security
Locking down WLANs

Locking down WLANs

If I say the word security to you, what comes to mind? Do you think of the access card keys that allow you into your buildings; firewalls to protect your IT infrastructure; or cameras to monitor facilities? Perhaps you think of how to protect the data on your laptop if it is stolen.
Ray Cavanaugh Apr 14 2006 8:14PM Security
Taking on the protection challenge

Taking on the protection challenge

It is an old truism that crime goes where the money is. And today, the money is in the data, so that’s where we find the electronic crime.
Tim Mather Apr 14 2006 8:14PM Security
Reducing risk of online ID theft

Reducing risk of online ID theft

The total cost of U.S. identity fraud in 2004 was $52.6 billion, with 11.6 percent of stolen identity information obtained online, according to Javelin Strategy & Research and the Better Business Bureau. The proliferation of online applications providing access to confidential identity data has magnified vulnerabilities that are not adequately addressed by traditional network security techniques. The following policies, procedures and systems are recommended to implement a security program for online applications.
Bruce Pharr Apr 14 2006 8:14PM Security
Paying the cost to be the boss

Paying the cost to be the boss

In our organizations, we need to take a strong lead in many areas. The first area is awareness. There used to be a commercial where an executive, with a bit of a smirk, tells an IT engineer that he just opened an email attachment — like he was told not to. In our organizations, we know that sort of thing is happening somewhere in the company.
Peter Stephenson,CeRNS, Apr 14 2006 8:14PM Security
The worm turns on Apple

The worm turns on Apple

Macintosh enthusiasts have long used the security of their systems as a flag to wave in the faces of their Windows-using counterparts. With the recent announcement of some key holes in Mac OS X, that flag is drooping.
Ericka Chickowski Apr 14 2006 8:14PM Security

Log In

  |  Forgot your password?