Features

Review: Red-Alert PRO and Red Detect

Review: Red-Alert PRO and Red Detect

Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: RFprotect

Review: RFprotect

This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: Wireless Site Management

Review: Wireless Site Management

Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Know your customers, inside and out

Know your customers, inside and out

The best way to work with the Patriot Act is to stay one step ahead of the pack, says Kristin Lovejoy
Kristin Lovejoy May 9 2005 12:37PM Security
The five Ps of patch management

The five Ps of patch management

Security and vulnerability patching has become one of the top concerns for IT managers, but has also left many IT teams fighting a losing battle as the job of patching competes with daily system maintenance and security tasks.
Staff Writers May 9 2005 11:06AM Security
Review: AirDefense Enterprise

Review: AirDefense Enterprise

AirDefense Enterprise is one of those wireless-security products that integrates into the enterprise as an integral part of the overall network management scheme.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: BlueSecure

Review: BlueSecure

BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: OmniPeek

Review: OmniPeek

This complete software offering can be installed on almost any system in the organization to capture data from the system's internal wireless card. But check the compatibility chart before ordering, as only a specific set of wireless cards are supported.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
LDAP – the heart of the secure organization

LDAP – the heart of the secure organization

Single sign-on (SSO) has long been a holy grail for security teams in large complex organizations. But the obstacles in the way of its universal deployment have so far proved to be too great - in particular the challenge of interfacing and synchronizing data held in the various directories that larger companies typically deploy.
Ken Watt May 4 2005 11:15AM Security
The best defense for email retention

The best defense for email retention

Some organizations believe that minimizing the retention time of historical email reduces their business risk. They make it a routine practice, and in certain instances attempt to set company-wide policies, to delete old electronic communications, assuming that the messages will not be needed nor recoverable in other places.
Bernie Goulet May 3 2005 10:13AM Security
Bandwidth in the time of cholera

Bandwidth in the time of cholera

In internet service provision, if an end user customer catches cholera that is their problem.
Jonathan Mepsted Apr 28 2005 9:39AM Security
DDoS: don't get stuck in denial

DDoS: don't get stuck in denial

Forward-looking companies have long realized the great business opportunities that the Internet offers and it's no secret that organizations are shifting more and more of their business processes online.
Staff Writers Apr 25 2005 12:36PM Security
Is your security event management tool credible?

Is your security event management tool credible?

Security Event Management (SEM) vendors often talk about scalability when addressing the degree to which their products can accommodate growth in a customer's increasing network and/or security requirements.
Roberto Angelino, Apr 20 2005 12:32PM Security
It’s time to put up the money, America

It’s time to put up the money, America

Various IT security experts from private and public sectors in the U.S. recently attended Singapore's Infocomm Security Seminar to provide their input on ways to secure cyberspace.
Illena Armstrong Apr 19 2005 1:24PM Security
2 MINUTES ON… Data breaches and the law

2 MINUTES ON… Data breaches and the law

The recent spate of breaches involving thousands of Americans' sensitive data has prompted calls for legislation to protect consumer information. But some security experts disagree.
Marcia Savage Apr 19 2005 1:16PM Security
Me and my job

Me and my job

Damien Adams, systems administrator, Juvenile Welfare Board, Pinellas County, FL
Staff Writers Apr 19 2005 1:06PM Security
Welcome to your new-look SC Magazine

Welcome to your new-look SC Magazine

We've got a brand-new look in SC Magazine from this month, with a fast-paced new opening section that is designed to give you as complete a picture of what's happening around the world of IT security as you'll find anywhere.
Ron Condon Apr 19 2005 12:58PM Security
Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Any time one compares Linux and Windows security one risks unleashing a cataract of opinion.
Richard Ford Apr 19 2005 12:42PM Security
2 MINUTES ON… Keyloggers: invisible threat

2 MINUTES ON… Keyloggers: invisible threat

The recent attempted robbery of £220 million from the Sumitomo Mitsui Bank in London last month has brought the problem of spyware and keyloggers into sharp relief.
René Millman Apr 19 2005 12:29PM Security
Me and my job

Me and my job

Gary Cooper, Senior technical consultant, Whale Communications
Staff Writers Apr 19 2005 12:22PM Security

Log In

  |  Forgot your password?