Features

The changing face of spam

The changing face of spam

Junk email clogging up your inbox used to be annoying, but as René Millman reports, it’s moved beyond that and become a lot more sinister
René Millman Feb 21 2005 5:02PM Security
Can the phishing war be won?

Can the phishing war be won?

Phishing is now an accepted fact of life for many Internet users. Most of the emails that they receive are clearly from friends or business contacts, or clearly fraudulent. But there are a few, just a few, that might just be genuine, and there will always be a small percentage of users who will follow the link sent them in the email, and connect to what they think is their bank, and give the phishers their reward.
Dr Jonathan Feb 21 2005 12:41PM Security
Between friends: Don’t extend trust too far

Between friends: Don’t extend trust too far

Outsourcing opens you to a wealth of network security risks, warn Benny Jones and Dorian Deane. Vigilance is the key to overcoming them
Benny Jones Feb 18 2005 5:10PM Security
Stop that fraud: Fingerprints will secure Texan systems

Stop that fraud: Fingerprints will secure Texan systems

A pilot system to beat Medicaid fraud is showing good results in the state of Texas.

John Sterlicchi Feb 18 2005 4:22PM Security
In from the field: Complying with remote access rules

In from the field: Complying with remote access rules

The agricultural supplier turned to ActivCard to bring its remote access procedures into line with new federal rules.

Marcia Savage Feb 18 2005 4:04PM Security
Fit for anything: Gold’s Gym updates its infrastructure

Fit for anything: Gold’s Gym updates its infrastructure

When the best-of-breed solutions proved too costly, the gym brand turned to Fortinet.
John Sterlicchi Feb 18 2005 3:31PM Security
Review: WebConnect SSO

Review: WebConnect SSO

WebConnect SSO provides SSO access to mainframes (or, to put it another way, multiple mainframe applications) via a web browser interface.

Julian Ashbourn Feb 18 2005 12:00AM Security
Review: Passlogix v-GO SSO

Review: Passlogix v-GO SSO

The Passlogix single sign-on product is particularly versatile and caters for a broad range of potential applications. You can use it in a simple set-up for accessing your Windows and web applications, or, if you really want to put it to work, you can configure it for a variety of client/server, mainframe, database and even dial-up networking and VPN applications.

Julian Ashbourn Feb 18 2005 12:00AM Security
Review: CenturionMail

Review: CenturionMail

This product is designed to provide simple yet robust encryption for electronic communication.

Alan Bridges Feb 18 2005 12:00AM Security
Review: CryptoCard

Review: CryptoCard

The CryptoCard package came with neatly and securely packaged hardware and software. The documentation was complete and very well presented, including useful screenshots. Installation was a breeze and the installation procedure very clear. We encountered no errors during installation.

Peter Stephenson,CeRNS, Feb 18 2005 12:00AM Security
Zen and the art of intrusion detection

Zen and the art of intrusion detection

If a tree falls in a forest with no-one to hear it, does it make a sound? So goes a typical zen-like philosophical question. While it’s thought-provoking, what does it have to do with Intrusion Detection Systems (IDS)?
David Beesley Feb 17 2005 10:02AM Security
Review: eTrust Single Sign On

Review: eTrust Single Sign On

eTrust Single Sign On offers SSO functionality across a broad spectrum, from client applications to web applications, secured databases and virtually any networked application. It also offers useful tools to administer users, policies and even sessions.

Julian Ashbourn Feb 16 2005 12:00AM Security
Review: Citrix MetaFrame Password Manager

Review: Citrix MetaFrame Password Manager

The Citrix MetaFrame Password Manager provides a relatively straightforward means of managing various application passwords and automating the application log-on process. In fact, it appears deceptively simple, although it can offer fairly comprehensive functionality. The Password Manager Agent sits on the client, while the Password Manager Console is located at a convenient central point.

Julian Ashbourn Feb 16 2005 12:00AM Security
Review: Evidian Secure Access Manager

Review: Evidian Secure Access Manager

This is a comprehensive product that offers managed access and SSO functionality to applications via the internet, terminal emulation or Windows. It can also be regarded as a modular component of the even broader Access Master suite, which includes additional components for provisioning, managing certificates and workflow and other functions.

Julian Ashbourn Feb 16 2005 12:00AM Security
Review: HP Open View Select Access

Review: HP Open View Select Access

HP OpenView Select Access 6.0 provides a sophisticated and scalable access management solution for online resources. It may be used for employees accessing intranet resources, for external users undertaking transactions with your organization via the internet, for partner organizations to share resources, or any mix of access.

Julian Ashbourn Feb 16 2005 12:00AM Security
Review: P-Synch

Review: P-Synch

P-Synch concentrates on password management and synchronization, rather than single sign-on in the accepted sense.

Julian Ashbourn Feb 16 2005 12:00AM Security
Mobile Skullduggery Afoot

Mobile Skullduggery Afoot

Like a moth emerging from its cocoon, the original mobile phone worm Cabir has evolved from proof-of-concept program to an altogether more harmful and fast-spreading variant in just six months. The most recent step is the posting of the original source code on the internet by the virus authoring group 29a, which could lead to a host of other harmful versions being developed and unleashed.
Patrik Runald Feb 14 2005 1:37PM Security
Review: Aladdin eToken SSO

Review: Aladdin eToken SSO

Aladdin's eToken SSO solution is based on the use of USB tokens upon which information is stored, including user data, application profiles and, if you wish, other certificates. This makes for a particularly intuitive operation as, once everything is set up, you just plug in your token and enter your password once. And when you have finished, simply remove the token.

Julian Ashbourn Feb 11 2005 12:00AM Security
Review: Authenex ASAS

Review: Authenex ASAS

The Authenex ASAS system is a very robust system designed for large companies. It requires a standalone server running Windows 2000 with SP4 or Windows 2003. It must also have a Radius or SQL server on the system to allow for use of the integrated database of A-Key tokens supplied with the system.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: GemSafe Logon

Review: GemSafe Logon

GemSafe Logon is intended for the individual computer. It is self-contained, but with an administrative twist. Access policies are set up centrally by an administrator who creates a configuration file for the individual smartcards and distributes it to users. This is practical for smaller installations but perhaps not for large, distributed enterprises.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security

Log In

  |  Forgot your password?