Features

Review: Reflex IPS100

Review: Reflex IPS100

Reflex’s IPS100 is loaded with features. It gives a thorough inspection to all network traffic, and can also be used to filter certain traffic. The device operates inline and examines for both external as well as internal threats.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sentivist Real Time Threat Protection System

Review: Sentivist Real Time Threat Protection System

NFR is one of the pioneers in intrusion detection and prevention, and its pedigree shows in this product.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Sourcefire 3D IPS1000

Review: Sourcefire 3D IPS1000

The Sourcefire box does all the things an IPS should do. It fits comfortably in the category of an average IPS, although it must be remembered that the Sourcefire 3D Suite includes a ton of IDS, scanning, and vulnerability management capability which falls outside the context of this review. As an IPS, the box has no standout features, and nothing specifically separates it from other IPSs.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: TippingPoint 200E

Review: TippingPoint 200E

Since 200E is what we call a learning device, it requires a little time on the network to begin protecting assets.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Top Layer IPS 5500-50

Review: Top Layer IPS 5500-50

This device incorporates several features in one box. It has real flexibility, with fully adjustable and customisable policies, port configuration, and management screens. It also offers several different report types, which make finding clear information about attacks or network activity easy. Reports can also be created according to a schedule set by an administrator and saved on the device for review later.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Your invitation to the SC Forum

Your invitation to the SC Forum

At the SC Magazine Forum, you could gain information, advice and great contacts to help you more readily achieve your goals as an IT security pro. Read on to see if you qualify for a free delegate place.
Staff Writers Apr 14 2006 8:14PM Security
Raising information exchange

Raising information exchange

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s "The Black Book on Government Security," as part of an agreement with Larstan Publishing. This month’s excerpt will be available in an extended form on http://www.scmagazine.com.
Gregory N. Apr 14 2006 8:14PM Security
IDM: Moving up

IDM: Moving up

Knowing who’s accessing what on enterprise networks that often lack defined perimeters is a necessity. So many company executives are trying to sort out the problems associated with establishing, controlling and terminating their employees’ various user rights.
Rene Millman Apr 14 2006 8:14PM Security
Controlling the endpoint

Controlling the endpoint

There’s yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), network access control (NAC), or network access protection (NAP), the main question is: Who has the real deal?
Jim Carr Apr 14 2006 8:14PM Security
Cover story: Defining trust

Cover story: Defining trust

As the mastermind of the Bali nightclub bombings awaited execution, he published a jailhouse autobiography teaching others to follow in his footsteps.
Dan Kaplan Apr 14 2006 8:14PM Security
Locking down WLANs

Locking down WLANs

If I say the word security to you, what comes to mind? Do you think of the access card keys that allow you into your buildings; firewalls to protect your IT infrastructure; or cameras to monitor facilities? Perhaps you think of how to protect the data on your laptop if it is stolen.
Ray Cavanaugh Apr 14 2006 8:14PM Security
Got something to say

Got something to say

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Apr 14 2006 8:14PM Security
Taking on the protection challenge

Taking on the protection challenge

It is an old truism that crime goes where the money is. And today, the money is in the data, so that’s where we find the electronic crime.
Tim Mather Apr 14 2006 8:14PM Security
Paying the cost to be the boss

Paying the cost to be the boss

In our organizations, we need to take a strong lead in many areas. The first area is awareness. There used to be a commercial where an executive, with a bit of a smirk, tells an IT engineer that he just opened an email attachment — like he was told not to. In our organizations, we know that sort of thing is happening somewhere in the company.
Peter Stephenson,CeRNS, Apr 14 2006 8:14PM Security
Reducing risk of online ID theft

Reducing risk of online ID theft

The total cost of U.S. identity fraud in 2004 was $52.6 billion, with 11.6 percent of stolen identity information obtained online, according to Javelin Strategy & Research and the Better Business Bureau. The proliferation of online applications providing access to confidential identity data has magnified vulnerabilities that are not adequately addressed by traditional network security techniques. The following policies, procedures and systems are recommended to implement a security program for online applications.
Bruce Pharr Apr 14 2006 8:14PM Security
Me and my job

Me and my job

What do you like about your job?
Nancy Edwards Apr 14 2006 8:14PM Security
The worm turns on Apple

The worm turns on Apple

Macintosh enthusiasts have long used the security of their systems as a flag to wave in the faces of their Windows-using counterparts. With the recent announcement of some key holes in Mac OS X, that flag is drooping.
Ericka Chickowski Apr 14 2006 8:14PM Security
Company news

Company news

»Information Consulting Group has acquired project management firm Net Solutions. The merger provides the business consultant organization’s customers with IT security management solutions. ICG specializes in financial services, consumer products, healthcare and manufacturing. http://www.infoconsultgroup.com
Staff Writers Apr 14 2006 8:14PM Security
Debate: Federated identity will become a reality in the not too distant future

Debate: Federated identity will become a reality in the not too distant future

For, by Nishant Kaushik, architect, security and identity products, Oracle
Staff Writers Apr 14 2006 8:14PM Security
News briefs

News briefs

Security and privacy experts voiced their concerns over whether or not Google’s latest desktop feature is a threat because of a controversial feature that allows users to run remote searches across multiple computers. The internet search giant contended that the “search across computers” feature of Google Desktop 3 Beta, “helps users easily access information from all their computers so they don’t need to remember where all of their documents are organized or filed.” However, the Electronic Frontier Foundation said that the feature would make personal data more susceptible to government subpoenas and hackers.
Staff Writers Apr 14 2006 8:14PM Security

Log In

  |  Forgot your password?