Features

Review: NETconsent

Review: NETconsent

Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Policy Commander

Review: Policy Commander

Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.

Eric Doyle Jul 27 2005 12:00AM Security
Review: PolicyMatter

Review: PolicyMatter

Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UniGuard-V34 & Port Authority 44

Review: UniGuard-V34 & Port Authority 44

The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Websense Enterprise

Review: Websense Enterprise

This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Eric Doyle Jul 27 2005 12:00AM Security
Can you keep a secret?

Can you keep a secret?

With increasingly extended and dynamic enterprises, the distinction between insiders and outsiders is becoming blurred and what organizations can expect to control is less clear.
Paul Galwas Jul 25 2005 10:58AM Security
Debate» Voice over IP networks pose a security threat to enterprises and their users

Debate» Voice over IP networks pose a security threat to enterprises and their users

David Endler Jul 22 2005 3:27PM Security
The new breed of trojans

The new breed of trojans

A sinister new trend is emerging, with specially crafted trojans targeted at individual companies. The threat reveals the use of malware in industrial or even state-sponsored espionage.
René Millman Jul 22 2005 3:17PM Security
Me and my job

Me and my job

Staff Writers Jul 22 2005 3:10PM Security
Blogging your secrets away?

Blogging your secrets away?

Blogs aren’t all bad. And there are practices you can adopt to protect trade secrets
Staff Writers Jul 22 2005 2:36PM Security
The next generation is here

The next generation is here

I recently attended the graduation of the latest class of Norwich University's Master of Science in Information Assurance program. It was one of the high points of my lengthy career. In the spirit of full disclosure, I've been teaching in this program, for mid-career adults, since its inception. This was the second graduation in the 18-month program.
Peter Stephenson,CeRNS, Jul 22 2005 2:32PM Security
Review: East-Tec Eraser 2005

Review: East-Tec Eraser 2005

East-Tec Eraser 2005 is a dual-purpose product, combining secure file deletion with clean-up tools to erase traces from PCs.

Jon Tullett Jul 22 2005 12:00AM Security
Law is nothing without enforcement

Law is nothing without enforcement

There is a great deal of legislation being proposed that could have a big impact on information security, most of it the result of concerns over ID theft.
Dave Cullinane Jul 21 2005 5:27PM Security
WANTED: A new breed of superhero

WANTED: A new breed of superhero

Phishing and identity theft is becoming more sophisticated and more successful, despite high-profile legal triumphs. David Quainton looks at how the phishers have advanced, and what we need to do to match them
David Quainton Jul 21 2005 3:43PM Security
Evolution of the species

Evolution of the species

Now that ever more apps are made for the web, a technology born there is getting a chance to shine.
Marcia Savage Jul 21 2005 3:18PM Security
How to make clueless users ‘clueful’

How to make clueless users ‘clueful’

Little green men? Aliens from another world? Nope, it’s just Winn Schwartau’s latest obsession
Winn Schwartau Jul 21 2005 11:46AM Security
Review: EnCase Forensic

Review: EnCase Forensic

Guidance Software's EnCase product is the undisputed heavyweight of the forensic software market, and version 5.0 introduces a slew of new features that will keep its opposition firmly on the ropes.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Forensic Field Kit

Review: Forensic Field Kit

WiebeTech's forensic kits tackle two very specific points of pain for forensic investigators: conducting field acquisition and transporting data safely (to prevent damage and ensure the chain of evidence is unchallengeable).

Jon Tullett Jul 21 2005 12:00AM Security

Log In

  |  Forgot your password?