Features

Businesses  should manage and monitor employee email usage.

Businesses should manage and monitor employee email usage.

In a few short years, email has become a major part of the national psyche and a business-critical tool of communication.
Jamie Cowper Dec 21 2004 12:09PM Security
The challenge of securing VoIP

The challenge of securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within the network.
John Porter Dec 21 2004 12:01PM Security
Days in the life of a pen-tester

Days in the life of a pen-tester

Foreign hackers, weak passwords, backdoors and buffer overflows – just another day at the office for Network Defence’s penetration testers. Here’s a look at sample pages from the head tester’s diary– and what companies can learn from the results.
David Beesley Dec 21 2004 11:34AM Security
Review: Corpex Armourplate

Review: Corpex Armourplate

Armourplate is a managed service with offices in the U.K. and Germany. Although the website claims to be "for U.K. business", the company says it is open to customers anywhere in the world. With the contact details and office hours limited to U.K. specifics, we feel the company (or its parent, Corpex) could be doing a lot more to draw attention to this.

Jon Tullett Dec 21 2004 12:00AM Security
Review: EPA

Review: EPA

EPA (Email Protection Agency) is a reseller for the Email Systems mail filtering services. As managed services settle down, we expect to see a lot more of the larger services being offered as rebadged services through other channels and service providers.

Jon Tullett Dec 21 2004 12:00AM Security
Review: Frontbridge

Review: Frontbridge

This service has been clearly aimed at large (or complicated) organizations that might be managing multiple domains. It can do clever tricks such as rewriting email addresses and handling subdomains that may not have been specifically configured. Administrators can be created with limited sets of responsibilities.

Jon Tullett Dec 21 2004 12:00AM Security
Review: INSL SpheriQ

Review: INSL SpheriQ

INSL's SpheriQ service started off well in our tests. A detailed setup process was well managed and we liked the inclusion of a relay test conducted against our mail servers.

Jon Tullett Dec 21 2004 12:00AM Security
Review: intY MailDefender

Review: intY MailDefender

IntY's MailDefender manages to squeeze quite a lot of mail filters and controls into an attractive and uncomplicated interface. We might have preferred the default first screen to be the useful quarantine summary (giving customer-wide mail totals), rather than the actual quarantining itself, but this was just a minor quibble.

Jon Tullett Dec 21 2004 12:00AM Security
Review: NetIntelligence MailFilter

Review: NetIntelligence MailFilter

MailFilter is a service with lots of good ideas, but it needs some final polish to really shine.

Jon Tullett Dec 21 2004 12:00AM Security
Review: Blackspider MailControl

Review: Blackspider MailControl

Blackspider's MailControl service won a Best Buy in SC Magazine last year for its strong service offering, and although FrontBridge beat it to the line this time around, MailControl is still a very good service indeed.

Jon Tullett Dec 21 2004 12:00AM Security
End of year survey: SC readers have their say

End of year survey: SC readers have their say

The end-of-year survey of attitudes among the SC readership provides a fascinating snapshot of our industry’s state of health. Ron Condon goes through the responses
Ron Condon Dec 18 2004 9:55PM Security
The seven sins of copier security are revealed…

The seven sins of copier security are revealed…

Wayne Foster Dec 18 2004 9:41PM Security
Government urged to clarify roles

Government urged to clarify roles

Microsoft is calling for the government to change its ways, reports Jon Tullett
Jon Tullett Dec 18 2004 9:39PM Security
The myth of clientless VPNs

The myth of clientless VPNs

Providing remote access to business critical applications and information is no longer optional – it’s a ‘must have’ for today’s extended enterprise. Employees are more mobile, telecommuting continues to escalate, and partners play an increasingly important role in business processes. More so than ever before, companies require secure, anywhere access to internal applications, real-time information distribution and interactive collaboration.
Staff Writers Dec 15 2004 12:27PM Security
CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

Corporations responsible for complying with Sarbanes-Oxley, face great hurdles with a basic compliance objective: analysis of their (server and security device) event logs. Some do not for lack of awareness, and others because of the difficulty (and cost) of performing the analysis. Further, issuers erroneously place the cost burden of SOX compliance on the IT security department, when the costs should be borne by the CFO’s SOX compliance budget.
Ron Lepofsky Dec 15 2004 12:27PM Security
Eight steps to securing administrative passwords

Eight steps to securing administrative passwords

When password management comes to mind, most IT managers think of their own personal passwords or those of end users, which are used to access the company's network, sales database or e-mail systems.
Calum Macleod Dec 15 2004 12:27PM Security
The financial risks of uncontrolled user access

The financial risks of uncontrolled user access

Dangers are posed by ineffective provisioning of user access rights. A secure enterprise provisioning system can address specific risk areas highlighted by the FSA’s Financial Crime Sector Report.
Michael Burling Dec 8 2004 1:13PM Security
20 seconds to comply

20 seconds to comply

Why businesses need to consider regulatory pressures sooner rather than later
Justin Opie Dec 8 2004 1:13PM Security
To prevent and protect – new approaches against spyware

To prevent and protect – new approaches against spyware

Ninety two per cent of IT directors can’t be wrong. That’s the overwhelming majority of high-ranking IT professionals that see spyware as more than a nuisance to enterprises [Web@Work research, 2004]. Estimates even put the number of desktops affected by spyware as high as 90 per cent [US National Cyber Security Alliance].
Nigel Hawthorn Dec 8 2004 1:13PM Security
Best of 2004

Best of 2004

Infosec arrives on corporate radar screens
René Millman Dec 8 2004 10:16AM Security

Log In

  |  Forgot your password?