Features

Review: Active Folders Content Manager

Review: Active Folders Content Manager

Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.

Eric Doyle Jul 27 2005 12:00AM Security
Review: MIMEsweeper for SMTP

Review: MIMEsweeper for SMTP

This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Adobe LiveCycle Policy Server

Review: Adobe LiveCycle Policy Server

Policy Server appeared with the release of Acrobat 7 earlier this year. It builds substantially on the encryption and password security of past editions of Acrobat and provides control over how Acrobat PDF format documents are accessed.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

ECM started as a Windows inventory management tool, but has moved with the times. This release turns it into a systems policy management and compliance system for Windows, Solaris and Red Hat.

Eric Doyle Jul 27 2005 12:00AM Security
Review: NETconsent

Review: NETconsent

Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Policy Commander

Review: Policy Commander

Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.

Eric Doyle Jul 27 2005 12:00AM Security
Review: PolicyMatter

Review: PolicyMatter

Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UniGuard-V34 & Port Authority 44

Review: UniGuard-V34 & Port Authority 44

The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Websense Enterprise

Review: Websense Enterprise

This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Eric Doyle Jul 27 2005 12:00AM Security
Can you keep a secret?

Can you keep a secret?

With increasingly extended and dynamic enterprises, the distinction between insiders and outsiders is becoming blurred and what organizations can expect to control is less clear.
Paul Galwas Jul 25 2005 10:58AM Security
Debate» Voice over IP networks pose a security threat to enterprises and their users

Debate» Voice over IP networks pose a security threat to enterprises and their users

David Endler Jul 22 2005 3:27PM Security
The new breed of trojans

The new breed of trojans

A sinister new trend is emerging, with specially crafted trojans targeted at individual companies. The threat reveals the use of malware in industrial or even state-sponsored espionage.
René Millman Jul 22 2005 3:17PM Security
Me and my job

Me and my job

Staff Writers Jul 22 2005 3:10PM Security
Blogging your secrets away?

Blogging your secrets away?

Blogs aren’t all bad. And there are practices you can adopt to protect trade secrets
Staff Writers Jul 22 2005 2:36PM Security
The next generation is here

The next generation is here

I recently attended the graduation of the latest class of Norwich University's Master of Science in Information Assurance program. It was one of the high points of my lengthy career. In the spirit of full disclosure, I've been teaching in this program, for mid-career adults, since its inception. This was the second graduation in the 18-month program.
Peter Stephenson,CeRNS, Jul 22 2005 2:32PM Security
Review: East-Tec Eraser 2005

Review: East-Tec Eraser 2005

East-Tec Eraser 2005 is a dual-purpose product, combining secure file deletion with clean-up tools to erase traces from PCs.

Jon Tullett Jul 22 2005 12:00AM Security
Law is nothing without enforcement

Law is nothing without enforcement

There is a great deal of legislation being proposed that could have a big impact on information security, most of it the result of concerns over ID theft.
Dave Cullinane Jul 21 2005 5:27PM Security
WANTED: A new breed of superhero

WANTED: A new breed of superhero

Phishing and identity theft is becoming more sophisticated and more successful, despite high-profile legal triumphs. David Quainton looks at how the phishers have advanced, and what we need to do to match them
David Quainton Jul 21 2005 3:43PM Security

Log In

  |  Forgot your password?