Features

Boards need to pay the cost

Boards need to pay the cost

In our organisations, we need to take a strong lead in many areas. The first is awareness. I remember a commercial where a smirking executive tells an IT engineer that he just opened an email attachment – like he was told not to. We know that sort of thing happens somewhere in our organisations.
Peter Stephenson,CeRNS, May 9 2006 4:23PM Security
Simon Heron, director, Network Box

Simon Heron, director, Network Box

It was almost inevitable that I got into security. I started off as a developer before moving into managing people. There I realised I had an interest in network security.

Staff Writers May 9 2006 4:23PM Security
Cyber-crime gets easier

Cyber-crime gets easier

Last month’s launch of the government’s new Serious Organised Crime Agency (SOCA) was welcomed by many commentators. With a growing threat from international drug gangs and the rise in people trafficking, a need was seen for a national agency with the teeth to tackle organised crime and the human misery it causes.
Paul Fisher May 9 2006 4:23PM Security
Handle risk better and reap the rewards

Handle risk better and reap the rewards

It’s been a busy month. By the time you read this, three highlights of the infosec year will have passed in quick succession: Infosecurity Europe, Jericho Forum’s annual conference and, of course, the SC Magazine Awards, Europe 2006. If you weren’t there on the night, the full list of winners and finalists is enclosed with this issue in the commemorative book of the night. Congratulations to all those who went home with one of the coveted gongs.
Paul Fisher May 9 2006 4:23PM Security
Debate: Should companies use unofficial patches to fix vulnerabilities?

Debate: Should companies use unofficial patches to fix vulnerabilities?

Alan Bentley May 9 2006 4:23PM Security
Protection for hire

Protection for hire

Hosted services are gaining in popularity. But should you put your faith in the people who offer IT security? Robert Jaques reports
Robert Jaques May 2 2006 4:35PM Security
Chance assessment

Chance assessment

It’s time to get real when measuring risk against acceptable loss. Business needs a more intelligent approach, says Gary Flood
Gary Flood May 2 2006 3:10PM Security
Review: ActiveScout

Review: ActiveScout

The ActiveScout appliance is a very basic intrusion prevention system that uses behaviour, not signatures to address a possible attack. It will identify whether the network is being scanned and then attempt to block the potential intrusion.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Ally ip100

Review: Ally ip100

We were amazed at what this little product could do and how strong it was. When it first arrived, we did not believe that this little piece of plastic could be a functional IPS. We were wrong.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: FortiGate-300A

Review: FortiGate-300A

The FortiGate-300A is a fullfunction front-end system for protecting a network in a way that goes far beyond intrusion prevention. It also has a built-in firewall and anti-virus protection as well as web filtering. Each port on the unit can be firewalled with specific rules and policies, allowing protected VLANs and isolated networks to be created.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: InstaGate PRO

Review: InstaGate PRO

The InstaGate has several interesting features. It can become more than just a firewall and IPS, as eSoft offers different software extensions, called SoftPaks. These include anti-virus, web filters, and IM and peer-to-peer filters. Apart from being an all-in-one device, it has a range of customisable reports and alert logs. It also includes several real-time monitors and keeps track of all internal and external activity.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: ipANGEL

Review: ipANGEL

This device features real-time vulnerability discovery on the network and can tune and adapt its policies for the best protection. As it learns more about the network, it customises its defences for the environment.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Nortel Threat Protection System

Review: Nortel Threat Protection System

The Nortel Threat Protection System runs on a Sourcefire platform, something that surprised us. The product is a flexible system composed of multiple sensors and a management console.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Reflex IPS100

Review: Reflex IPS100

Reflex’s IPS100 is loaded with features. It gives a thorough inspection to all network traffic, and can also be used to filter certain traffic. The device operates inline and examines for both external as well as internal threats.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sentivist Real Time Threat Protection System

Review: Sentivist Real Time Threat Protection System

NFR is one of the pioneers in intrusion detection and prevention, and its pedigree shows in this product.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sourcefire 3D IPS1000

Review: Sourcefire 3D IPS1000

The Sourcefire box does all the things an IPS should do. It fits comfortably in the category of an average IPS, although it must be remembered that the Sourcefire 3D Suite includes a ton of IDS, scanning, and vulnerability management capability which falls outside the context of this review. As an IPS, the box has no standout features, and nothing specifically separates it from other IPSs.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: TippingPoint 200E

Review: TippingPoint 200E

Since 200E is what we call a learning device, it requires a little time on the network to begin protecting assets.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Top Layer IPS 5500-50

Review: Top Layer IPS 5500-50

This device incorporates several features in one box. It has real flexibility, with fully adjustable and customisable policies, port configuration, and management screens. It also offers several different report types, which make finding clear information about attacks or network activity easy. Reports can also be created according to a schedule set by an administrator and saved on the device for review later.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Your invitation to the SC Forum

Your invitation to the SC Forum

At the SC Magazine Forum, you could gain information, advice and great contacts to help you more readily achieve your goals as an IT security pro. Read on to see if you qualify for a free delegate place.
Staff Writers Apr 14 2006 8:14PM Security
Raising information exchange

Raising information exchange

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s "The Black Book on Government Security," as part of an agreement with Larstan Publishing. This month’s excerpt will be available in an extended form on http://www.scmagazine.com.
Gregory N. Apr 14 2006 8:14PM Security

Log In

  |  Forgot your password?