Features

Bring the outside in

Bring the outside in

Intel et al are selling the wonders of mobility, but security chiefs need to build freedom into policy, says René Millman
René Millman Aug 26 2005 10:36AM Security
Review: Websense Enterprise Web Filtering

Review: Websense Enterprise Web Filtering

Websense's Web Filtering application is part of its Websense Enterprise suite of tools. It requires a copy of Windows 2000/2003 Server and a compliant web server. We used it with Microsoft's IIS, but you can also use Apache.

Christopher Moody Aug 25 2005 12:00AM Security
Review: Content Security Manager 2100CF

Review: Content Security Manager 2100CF

The 2100 CF is a dedicated content filtering appliance. It has three Fast Ethernet ports – two sit transparently inline with your internet, the third is a dedicated management port.

Christopher Moody Aug 25 2005 12:00AM Security
Review: FortiGate-800

Review: FortiGate-800

Fortinet's FortiGate-800 is the company's mid-range firewall. It uses FortiOS 3.0 (this is a correction from the incorrect v2.5 printed in the original article) and comes with antivirus and intrusion prevention as standard, both regularly updated.

Christopher Moody Aug 25 2005 12:00AM Security
Review: iPrism 1200

Review: iPrism 1200

St. Bernard's iPrism 1200 is a 1U rack-mountable appliance. With clearly labelled network ports, it is very simple to connect to the network. St. Bernard also sells the iPrism 3000, which is aimed at larger organizations, with Gigabit Ethernet.

Christopher Moody Aug 25 2005 12:00AM Security
Review: ProxySG 200

Review: ProxySG 200

The smallest appliance on test, Blue Coat's ProxySG 200 is half the width of standard rack mount equipment and uses a notebook-style power supply. Rather than a pure web filtering appliance, the ProxySG 200 is a full-fledged web proxy, with URL filtering built in. This makes it quick to process requests and gives you a single point of management for your proxy and web filtering.

Christopher Moody Aug 25 2005 12:00AM Security
Review: Vital Security Appliance NG-5100

Review: Vital Security Appliance NG-5100

Finjan Software's NG-5100 can be deployed as a single box, but the system supports a distributed environment where one appliance serves as a policy server, while others can scan through load balancing. It can sit as either a standard web proxy, in which case you have to reconfigure all client computers, or as a transparent web proxy.

Christopher Moody Aug 25 2005 12:00AM Security
Review: MIMEsweeper for Web

Review: MIMEsweeper for Web

Clearswift's MIMEsweeper for Web applies the company's email filtering system to the internet. It will install on a single Windows 2000/2003 server and works as a web proxy, scanning all requests.

Christopher Moody Aug 25 2005 12:00AM Security
Review: StorageSafe

Review: StorageSafe

StorageSafe is another offering in the removable-device security space. There are many products rubbing shoulders in this area, and the basics are pretty well covered. StorageSafe is not aimed at high-end environments, with key distribution and management features, but at quick and basic everyday data protection, which it does well.

Jon Tullett Aug 25 2005 12:00AM Security
Review: Nsauditor

Review: Nsauditor

Nsauditor (Network Security Auditor) is a Windows-based multi-purpose tool designed to scan networks and hosts for vulnerabilities, and to provide security alerts.

Jon Tullett Aug 25 2005 12:00AM Security
Review: NetIQ WebMarshal

Review: NetIQ WebMarshal

NetIQ's WebMarshal now supports all versions of Windows server. The installation is simple, but you need an SQL server on the network. While this means that you have to factor this cost into the purchase, it means you can distribute the WebMarshal install for better performance and scalability. You can also run the database on the same PC, as we did for our test.

Christopher Moody Aug 25 2005 12:00AM Security
Review: Pearl Echo

Review: Pearl Echo

Pearl Software's Echo 6 works in a slightly different way to the other products on test. Rather than blocking web traffic at the gateway, Echo uses a client/server approach. The server dictates the policy, while clients installed on each PC control internet access locally. While the server is very quick and easy to install, there's quite a lot of leg work involved in distributing the client to all of your network's computers.

Christopher Moody Aug 25 2005 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

SurfControl's Web Filter is, perhaps, the best known web filtering product on the market. We reviewed the Windows version of the product, but there are also versions available for Cisco CE, Check Point, Microsoft ISA and several third-party appliances, including Blue Coat and Finjan, both in this test. The standard Windows version is flexible – but you will need one copy of the filter per network.

Christopher Moody Aug 25 2005 12:00AM Security
Forensics is not just a word for cops

Forensics is not just a word for cops

Thieves will always steal business ideas, but you can catch them red-handed, says John Patzakis
John Patzakis Aug 24 2005 5:06PM Security
Virus writers and hackers change tactics

Virus writers and hackers change tactics

For some time now, Kaspersky Lab has been tracking a shift in virus writers' tactics. The relative decline in the number of global epidemics during the last year signals a move away from the use of mass attacks on users worldwide. Instead, attacks are becoming more localized.
David Emm Aug 22 2005 10:53AM Security
Phone fraud - the cost of doing nothing

Phone fraud - the cost of doing nothing

Convergence of voice, video and data onto a single network presents great opportunities for the Enterprise. These opportunities also bring ever changing challenges for the IT department – especially as voice becomes another application on the converged network.
Craig Pollard Aug 17 2005 10:45AM Security
Can the phishing war be won?

Can the phishing war be won?

"In the struggle for survival, the fittest win out at the expense of their rivals because they succeed in adapting themselves best to their environment." - Charles Darwin
Dr Jonathan Aug 15 2005 12:16PM Security
Can we Trust our Workforce?

Can we Trust our Workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Aug 10 2005 10:09AM Security
Day of the digital undead

Day of the digital undead

Like the living dead, armies of “zombie” computers are disrupting corporate networks and sucking the life out of business-critical systems around the world. Zombies strike fear into the hearts of IT personnel responsible for maintenance of corporate networks, and particularly those charged with protecting and ensuring the availability of vital corporate email systems.
David Stanley Aug 8 2005 12:07PM Security
Mobile workforce - security nightmare or opportunity?

Mobile workforce - security nightmare or opportunity?

Over the last decade blackberries, mobile phones, laptops, PDAs and a variety of other devices have become intrinsic to both our working and personal lives. It is impossible to imagine a life without them. Consumers and businesses alike have seen the advantages of real time communication and have embraced the technology that allows them to do more whilst on the move.
Dave Taylor Aug 3 2005 12:02PM Security

Log In

  |  Forgot your password?