Features

Review: WatchGuard Firebox X1000

Review: WatchGuard Firebox X1000

WatchGuard's Firebox X range of appliances is designed to cope with the needs of enterprises of all sizes.

Christopher Moody May 11 2005 12:00AM Security
Review: Network Engines NS6300

Review: Network Engines NS6300

Network Engines, along with Celestix and its MSA4000, is the second company in this test to use Microsoft's Internet Security & Acceleration Server in an appliance (see Celestix review for more information).

Christopher Moody May 11 2005 12:00AM Security
Review: SteelGate SG-200

Review: SteelGate SG-200

BorderWare's SteelGate SG-200 runs the company's own firewall, Firewall Server 7.1, running on the S-Core secure operating system. Rather than building an appliance from the ground up, the SG-200 is simply a PC (2GHz Intel Celeron Processor, 512MB RAM and a 40GB hard disk) in a rack-mountable chassis.

Christopher Moody May 11 2005 12:00AM Security
Review: Symantec Gateway Security 5460

Review: Symantec Gateway Security 5460

Symantec's Gateway Security 5460 is the largest, and one of the most powerful, appliances that we have had on test. It has eight Gigabit Ethernet ports, which can be configured to segregate a network or for high availability. The firewall can also be configured to load balance between a cluster, improving performance provided you have the correct license.

Christopher Moody May 11 2005 12:00AM Security
Review: ZyWALL 35

Review: ZyWALL 35

ZyXEL's ZyWall 35 shows that, while small in dimensions, it is not small on features. The front panel of the appliance houses two WAN and four LAN Fast Ethernet ports, while the rear of the device has out-of-band management through it is console port and a PC Card slot, so you can add 802.11g WiFi (see company website for supported cards).

Christopher Moody May 11 2005 12:00AM Security
Review: Astaro Security Linux

Review: Astaro Security Linux

Astaro's Security Linux 5.1 takes the open source Linux software and hardens it, but also adds commercial software for a complete security package. It comes with six components: firewall, VPN, anti-virus (provided by Kaspersky), content filtering, anti-spam and intrusion prevention.

Christopher Moody May 11 2005 12:00AM Security
Review: Red-Alert PRO and Red Detect

Review: Red-Alert PRO and Red Detect

Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: RFprotect

Review: RFprotect

This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: Wireless Site Management

Review: Wireless Site Management

Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Know your customers, inside and out

Know your customers, inside and out

The best way to work with the Patriot Act is to stay one step ahead of the pack, says Kristin Lovejoy
Kristin Lovejoy May 9 2005 12:37PM Security
The five Ps of patch management

The five Ps of patch management

Security and vulnerability patching has become one of the top concerns for IT managers, but has also left many IT teams fighting a losing battle as the job of patching competes with daily system maintenance and security tasks.
Staff Writers May 9 2005 11:06AM Security
Review: AirDefense Enterprise

Review: AirDefense Enterprise

AirDefense Enterprise is one of those wireless-security products that integrates into the enterprise as an integral part of the overall network management scheme.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: BlueSecure

Review: BlueSecure

BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: OmniPeek

Review: OmniPeek

This complete software offering can be installed on almost any system in the organization to capture data from the system's internal wireless card. But check the compatibility chart before ordering, as only a specific set of wireless cards are supported.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
LDAP – the heart of the secure organization

LDAP – the heart of the secure organization

Single sign-on (SSO) has long been a holy grail for security teams in large complex organizations. But the obstacles in the way of its universal deployment have so far proved to be too great - in particular the challenge of interfacing and synchronizing data held in the various directories that larger companies typically deploy.
Ken Watt May 4 2005 11:15AM Security
The best defense for email retention

The best defense for email retention

Some organizations believe that minimizing the retention time of historical email reduces their business risk. They make it a routine practice, and in certain instances attempt to set company-wide policies, to delete old electronic communications, assuming that the messages will not be needed nor recoverable in other places.
Bernie Goulet May 3 2005 10:13AM Security
Bandwidth in the time of cholera

Bandwidth in the time of cholera

In internet service provision, if an end user customer catches cholera that is their problem.
Jonathan Mepsted Apr 28 2005 9:39AM Security
DDoS: don't get stuck in denial

DDoS: don't get stuck in denial

Forward-looking companies have long realized the great business opportunities that the Internet offers and it's no secret that organizations are shifting more and more of their business processes online.
Staff Writers Apr 25 2005 12:36PM Security
Is your security event management tool credible?

Is your security event management tool credible?

Security Event Management (SEM) vendors often talk about scalability when addressing the degree to which their products can accommodate growth in a customer's increasing network and/or security requirements.
Roberto Angelino, Apr 20 2005 12:32PM Security
It’s time to put up the money, America

It’s time to put up the money, America

Various IT security experts from private and public sectors in the U.S. recently attended Singapore's Infocomm Security Seminar to provide their input on ways to secure cyberspace.
Illena Armstrong Apr 19 2005 1:24PM Security

Log In

  |  Forgot your password?