Features

Review: ArcSight ESM

Review: ArcSight ESM

ArcSight's flagship product, the ArcSight Enterprise Security Manager, is a security event management (SEM) tool capable of analyzing large mounts of network data in real time. The IDS model fell down because the flood of unfiltered alerts overwhelmed the resources of security teams, but SEM provides correlation, filtering and analysis to, in theory, allow the few real threats to be picked out of the blizzard of less important alerts and false positives.

Jon Tullett Jun 15 2005 12:00AM Security
Review: Sourcefire 3D System

Review: Sourcefire 3D System

Sourcefire calls its 3D System a "network defense system," avoiding the now loaded terms IDS and IPS. But while some of its components are strictly IDS or IPS, the package as a whole deserves a much broader description.

Jon Tullett Jun 15 2005 12:00AM Security
Don't buy your way out of trouble

Don't buy your way out of trouble

The problem with most security companies is they are very product driven - you name your security problem, and they can sell you a product to fix it. Whilst it's always tempting to think that you can fix a problem by buying something from a catalogue, the reality is often very different.
Adrian Polley Jun 13 2005 11:20AM Security
Review: FortiGate 5020

Review: FortiGate 5020

Fortinet's FortiGate 5020 is built using a powerful chassis containing dual, hot-swappable power supplies as standard, building in redundancy. The chassis can also house two 5001 blades, each of which comes with four copper Gigabit Ethernet ports and four small, form-factor pluggable (SFP) ports.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Gateway Security 5440

Review: Gateway Security 5440

Symantec's Gateway Security 5440 fits in the middle of its 5400 series range. It comes with six Gigabit Ethernet interfaces, although you can also buy the 5441, with four fiber and two copper interfaces instead.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Internet Security & Acceleration Server 2004 Enterprise Edition

Review: Internet Security & Acceleration Server 2004 Enterprise Edition

Microsoft's Internet Security & Acceleration (ISA) Server 2004, is the company's application for turning a Windows 2000 or 2003 server into an enterprise firewall. Installation was painless on our test Windows 2003 server.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Nokia IP380

Review: Nokia IP380

The Nokia-Check Point partnership has been a successful one, combining Nokia's excellent hardware implementation with Check Point's proven security technology, as we can see with the IP380. Aimed at the small enterprise or branch office, the IP380 comes with a cryptographic accelerator, capable of 130Mbps of 3DES VPN traffic and four Fast Ethernet ports. With two spare slots in the 1U chassis, you can upgrade network capability at a later date.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Nortel Switched Firewall 6624

Review: Nortel Switched Firewall 6624

Nortel's whole approach to security is different to the other manufacturers on test, as this bundle incorporates two products: the 6600 Accelerator and the Director 5024 firewall.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Pro 5060f

Review: Pro 5060f

Better known for its smaller appliances, SonicWall has pushed into the enterprise market with its Pro 5060f. Running SonicOS Enhanced 3.1, the 1U appliance houses a 2.4GHz Intel Xeon processor, 512MB of RAM and six Gigabit Ethernet interfaces. The 'f' in our model signifies that two of these ports are multimode fiber, but you can buy a 5060 with six copper ports.

Christopher Moody Jun 10 2005 12:00AM Security
Review: TSP3600

Review: TSP3600

CyberGuard's TSP3600 is a beast of a firewall. A case 5U high houses a RAID array for data protection, 13 Gigabit Ethernet ports and one Fast Ethernet (up to a maximum of 30 ports) – more than enough ports to cope with very large networks.

Christopher Moody Jun 10 2005 12:00AM Security
Fessing up should be easier than this

Fessing up should be easier than this

Notification is key to compliance, but you need to know what has been lost, says Kevin Mandia
Kevin Mandia Jun 9 2005 2:39PM Security
Review: PC-Duo

Review: PC-Duo

We evaluated a previous version of PC-Duo and were generally impressed with its intuitive interface and no-nonsense functions. We are pleased to report that the previous strengths – an attractive and intuitive interface – remain. The functionality has also been well considered and will be truly useful in a broad range of operational scenarios.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: SecurityExpressions

Review: SecurityExpressions

SecurityExpressions is a comprehensive audit and compliance software tool which is easy to deploy and usable in most computing environments. It can audit systems either with or without agents deployed on the target machines.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Track-It Professional

Review: Track-It Professional

Track-It comes in three flavors, with varying levels of sophistication: Standard, Professional and Enterprise.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Ecora Enterprise Auditor

Review: Ecora Enterprise Auditor

Ecora Enterprise Auditor 3.5 is a comprehensive package tailored to fit into most contemporary IT environments.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

Auditing software requirements will naturally vary between organizations. In many cases, a relatively straightforward approach will be all that is necessary. But sometimes you might want a higher level of analysis and control.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: LANDesk Management Suite

Review: LANDesk Management Suite

The LANDesk Management Suite is much more than just an auditing tool. It is a comprehensive group of tools for generally managing a corporate network which might include large numbers of clients.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: LANsurveyor

Review: LANsurveyor

LANsurveyor 9 is a subtly different program from others tested here. At its heart is a graphical mapping capability that allows you to create "maps" of your network to various levels of detail. These maps might be used solely within the program, or be exported in a variety of formats, including Microsoft Visio, so you can edit them as appropriate to your organizational requirements.

Julian Ashbourn Jun 9 2005 12:00AM Security
The roadmap to identity management

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Stuart Okin Jun 3 2005 12:27PM Security
Where techies, businessman and lawyers meet

Where techies, businessman and lawyers meet

With the average cost of a single security breach at over half a million dollars, IT professionals acknowledge the need for proactive, enterprise-wide network security. In today’s business environment, it is the trends towards increased involvement of business leaders and legal departments that is an interesting dynamic to the security industry as a whole.
Vincent Bieri Jun 1 2005 11:16AM Security

Log In

  |  Forgot your password?