Features

Review: Nokia IP380

Review: Nokia IP380

The Nokia-Check Point partnership has been a successful one, combining Nokia's excellent hardware implementation with Check Point's proven security technology, as we can see with the IP380. Aimed at the small enterprise or branch office, the IP380 comes with a cryptographic accelerator, capable of 130Mbps of 3DES VPN traffic and four Fast Ethernet ports. With two spare slots in the 1U chassis, you can upgrade network capability at a later date.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Nortel Switched Firewall 6624

Review: Nortel Switched Firewall 6624

Nortel's whole approach to security is different to the other manufacturers on test, as this bundle incorporates two products: the 6600 Accelerator and the Director 5024 firewall.

Christopher Moody Jun 10 2005 12:00AM Security
Review: Pro 5060f

Review: Pro 5060f

Better known for its smaller appliances, SonicWall has pushed into the enterprise market with its Pro 5060f. Running SonicOS Enhanced 3.1, the 1U appliance houses a 2.4GHz Intel Xeon processor, 512MB of RAM and six Gigabit Ethernet interfaces. The 'f' in our model signifies that two of these ports are multimode fiber, but you can buy a 5060 with six copper ports.

Christopher Moody Jun 10 2005 12:00AM Security
Review: TSP3600

Review: TSP3600

CyberGuard's TSP3600 is a beast of a firewall. A case 5U high houses a RAID array for data protection, 13 Gigabit Ethernet ports and one Fast Ethernet (up to a maximum of 30 ports) – more than enough ports to cope with very large networks.

Christopher Moody Jun 10 2005 12:00AM Security
Fessing up should be easier than this

Fessing up should be easier than this

Notification is key to compliance, but you need to know what has been lost, says Kevin Mandia
Kevin Mandia Jun 9 2005 2:39PM Security
Review: PC-Duo

Review: PC-Duo

We evaluated a previous version of PC-Duo and were generally impressed with its intuitive interface and no-nonsense functions. We are pleased to report that the previous strengths – an attractive and intuitive interface – remain. The functionality has also been well considered and will be truly useful in a broad range of operational scenarios.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: SecurityExpressions

Review: SecurityExpressions

SecurityExpressions is a comprehensive audit and compliance software tool which is easy to deploy and usable in most computing environments. It can audit systems either with or without agents deployed on the target machines.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Track-It Professional

Review: Track-It Professional

Track-It comes in three flavors, with varying levels of sophistication: Standard, Professional and Enterprise.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Ecora Enterprise Auditor

Review: Ecora Enterprise Auditor

Ecora Enterprise Auditor 3.5 is a comprehensive package tailored to fit into most contemporary IT environments.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

Auditing software requirements will naturally vary between organizations. In many cases, a relatively straightforward approach will be all that is necessary. But sometimes you might want a higher level of analysis and control.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: LANDesk Management Suite

Review: LANDesk Management Suite

The LANDesk Management Suite is much more than just an auditing tool. It is a comprehensive group of tools for generally managing a corporate network which might include large numbers of clients.

Julian Ashbourn Jun 9 2005 12:00AM Security
Review: LANsurveyor

Review: LANsurveyor

LANsurveyor 9 is a subtly different program from others tested here. At its heart is a graphical mapping capability that allows you to create "maps" of your network to various levels of detail. These maps might be used solely within the program, or be exported in a variety of formats, including Microsoft Visio, so you can edit them as appropriate to your organizational requirements.

Julian Ashbourn Jun 9 2005 12:00AM Security
The roadmap to identity management

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Stuart Okin Jun 3 2005 12:27PM Security
Where techies, businessman and lawyers meet

Where techies, businessman and lawyers meet

With the average cost of a single security breach at over half a million dollars, IT professionals acknowledge the need for proactive, enterprise-wide network security. In today’s business environment, it is the trends towards increased involvement of business leaders and legal departments that is an interesting dynamic to the security industry as a whole.
Vincent Bieri Jun 1 2005 11:16AM Security
Complying with identity management

Complying with identity management

In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Dr. Martin May 31 2005 11:06AM Security
The Patch Payback Problem

The Patch Payback Problem

On the second Tuesday of every month, Microsoft releases its latest compilation of security patches, prompting security professionals to quickly evaluate the impact of each on their entire infrastructure, put together a test and implementation plan, and efficiently close up those pesky vulnerabilities before the bad guys can get through. Just like clockwork, right? Don’t we wish!
Rick Blum May 25 2005 10:45AM Security
MyDoom: whodunit?

MyDoom: whodunit?

A new worm spread rapidly through the Internet at the end of last month, using clever tactics to dupe users and a sneaky payload which may have diverted attention from its real goal.
Jon Tullett May 23 2005 3:45PM Security
The codebreaker menace

The codebreaker menace

It’s an axiom of software development that every program will contain between five and 50 bugs per 1,000 lines of code. And five is reckoned to be only the most optimistic result; the reality is much closer to 50.
Maksym Schipka May 23 2005 10:46AM Security
Infosec: no longer just the IT department’s concern

Infosec: no longer just the IT department’s concern

In today’s ever increasing security conscious market, it is no longer sufficient simply to delegate the information security of an organization to the network administration staff.
John Golden May 18 2005 10:50AM Security
Protecting the borderless enterprise

Protecting the borderless enterprise

The well-publicized cases of information leakage in recent news articles have brought to light the risks of the borderless enterprise.
Staff Writers May 16 2005 11:30AM Security

Log In

  |  Forgot your password?