Features

Review: PC-Duo

Review: PC-Duo

We evaluated a previous version of PC-Duo and were generally impressed with its intuitive interface and no-nonsense functions. We are pleased to report that the previous strengths – an attractive and intuitive interface – remain. The functionality has also been well considered and will be truly useful in a broad range of operational scenarios.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: SecurityExpressions

Review: SecurityExpressions

SecurityExpressions is a comprehensive audit and compliance software tool which is easy to deploy and usable in most computing environments. It can audit systems either with or without agents deployed on the target machines.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Track-It Professional

Review: Track-It Professional

Track-It comes in three flavors, with varying levels of sophistication: Standard, Professional and Enterprise.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Ecora Enterprise Auditor

Review: Ecora Enterprise Auditor

Ecora Enterprise Auditor 3.5 is a comprehensive package tailored to fit into most contemporary IT environments.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

Auditing software requirements will naturally vary between organizations. In many cases, a relatively straightforward approach will be all that is necessary. But sometimes you might want a higher level of analysis and control.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: LANDesk Management Suite

Review: LANDesk Management Suite

The LANDesk Management Suite is much more than just an auditing tool. It is a comprehensive group of tools for generally managing a corporate network which might include large numbers of clients.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: LANsurveyor

Review: LANsurveyor

LANsurveyor 9 is a subtly different program from others tested here. At its heart is a graphical mapping capability that allows you to create "maps" of your network to various levels of detail. These maps might be used solely within the program, or be exported in a variety of formats, including Microsoft Visio, so you can edit them as appropriate to your organizational requirements.

Julian Ashbourn Jun 9 2005 12:00AM Security
The roadmap to identity management

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Stuart Okin Jun 3 2005 12:27PM Security
Where techies, businessman and lawyers meet

Where techies, businessman and lawyers meet

With the average cost of a single security breach at over half a million dollars, IT professionals acknowledge the need for proactive, enterprise-wide network security. In today’s business environment, it is the trends towards increased involvement of business leaders and legal departments that is an interesting dynamic to the security industry as a whole.
Vincent Bieri Jun 1 2005 11:16AM Security
Complying with identity management

Complying with identity management

In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Dr. Martin May 31 2005 11:06AM Security
The Patch Payback Problem

The Patch Payback Problem

On the second Tuesday of every month, Microsoft releases its latest compilation of security patches, prompting security professionals to quickly evaluate the impact of each on their entire infrastructure, put together a test and implementation plan, and efficiently close up those pesky vulnerabilities before the bad guys can get through. Just like clockwork, right? Don’t we wish!
Rick Blum May 25 2005 10:45AM Security
MyDoom: whodunit?

MyDoom: whodunit?

A new worm spread rapidly through the Internet at the end of last month, using clever tactics to dupe users and a sneaky payload which may have diverted attention from its real goal.
Jon Tullett May 23 2005 3:45PM Security
The codebreaker menace

The codebreaker menace

It’s an axiom of software development that every program will contain between five and 50 bugs per 1,000 lines of code. And five is reckoned to be only the most optimistic result; the reality is much closer to 50.
Maksym Schipka May 23 2005 10:46AM Security
Infosec: no longer just the IT department’s concern

Infosec: no longer just the IT department’s concern

In today’s ever increasing security conscious market, it is no longer sufficient simply to delegate the information security of an organization to the network administration staff.
John Golden May 18 2005 10:50AM Security
Protecting the borderless enterprise

Protecting the borderless enterprise

The well-publicized cases of information leakage in recent news articles have brought to light the risks of the borderless enterprise.
Staff Writers May 16 2005 11:30AM Security
How to clean up after Sumitomo Mitsui

How to clean up after Sumitomo Mitsui

When the truth finally comes out about the attempted theft of £220 million from Sumitomo Mitsui Bank in March, it's likely to have all the hallmarks of an inside job – certainly that the crime relied on having people on the inside to carry it out.
Ron Condon May 13 2005 5:39PM Security
Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Robert Schifreen May 13 2005 5:35PM Security
2 MINUTES ON… Indexing good behaviour

2 MINUTES ON… Indexing good behaviour

René Millman May 13 2005 5:29PM Security
Me and my job

Me and my job

Staff Writers May 13 2005 5:23PM Security
An institute is the next step

An institute is the next step

The industry needs a body to set and monitor standards and ensure the fitness of its practitioners
Prof. Fred May 13 2005 5:18PM Security

Log In

  |  Forgot your password?