Features

Review: Frontbridge

Review: Frontbridge

This service has been clearly aimed at large (or complicated) organizations that might be managing multiple domains. It can do clever tricks such as rewriting email addresses and handling subdomains that may not have been specifically configured. Administrators can be created with limited sets of responsibilities.

Jon Tullett Dec 21 2004 12:00AM Security
Review: INSL SpheriQ

Review: INSL SpheriQ

INSL's SpheriQ service started off well in our tests. A detailed setup process was well managed and we liked the inclusion of a relay test conducted against our mail servers.

Jon Tullett Dec 21 2004 12:00AM Security
Review: intY MailDefender

Review: intY MailDefender

IntY's MailDefender manages to squeeze quite a lot of mail filters and controls into an attractive and uncomplicated interface. We might have preferred the default first screen to be the useful quarantine summary (giving customer-wide mail totals), rather than the actual quarantining itself, but this was just a minor quibble.

Jon Tullett Dec 21 2004 12:00AM Security
Review: NetIntelligence MailFilter

Review: NetIntelligence MailFilter

MailFilter is a service with lots of good ideas, but it needs some final polish to really shine.

Jon Tullett Dec 21 2004 12:00AM Security
End of year survey: SC readers have their say

End of year survey: SC readers have their say

The end-of-year survey of attitudes among the SC readership provides a fascinating snapshot of our industry’s state of health. Ron Condon goes through the responses
Ron Condon Dec 18 2004 9:55PM Security
The seven sins of copier security are revealed…

The seven sins of copier security are revealed…

Wayne Foster Dec 18 2004 9:41PM Security
Government urged to clarify roles

Government urged to clarify roles

Microsoft is calling for the government to change its ways, reports Jon Tullett
Jon Tullett Dec 18 2004 9:39PM Security
The myth of clientless VPNs

The myth of clientless VPNs

Providing remote access to business critical applications and information is no longer optional – it’s a ‘must have’ for today’s extended enterprise. Employees are more mobile, telecommuting continues to escalate, and partners play an increasingly important role in business processes. More so than ever before, companies require secure, anywhere access to internal applications, real-time information distribution and interactive collaboration.
Staff Writers Dec 15 2004 12:27PM Security
CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

Corporations responsible for complying with Sarbanes-Oxley, face great hurdles with a basic compliance objective: analysis of their (server and security device) event logs. Some do not for lack of awareness, and others because of the difficulty (and cost) of performing the analysis. Further, issuers erroneously place the cost burden of SOX compliance on the IT security department, when the costs should be borne by the CFO’s SOX compliance budget.
Ron Lepofsky Dec 15 2004 12:27PM Security
Eight steps to securing administrative passwords

Eight steps to securing administrative passwords

When password management comes to mind, most IT managers think of their own personal passwords or those of end users, which are used to access the company's network, sales database or e-mail systems.
Calum Macleod Dec 15 2004 12:27PM Security
The financial risks of uncontrolled user access

The financial risks of uncontrolled user access

Dangers are posed by ineffective provisioning of user access rights. A secure enterprise provisioning system can address specific risk areas highlighted by the FSA’s Financial Crime Sector Report.
Michael Burling Dec 8 2004 1:13PM Security
20 seconds to comply

20 seconds to comply

Why businesses need to consider regulatory pressures sooner rather than later
Justin Opie Dec 8 2004 1:13PM Security
To prevent and protect – new approaches against spyware

To prevent and protect – new approaches against spyware

Ninety two per cent of IT directors can’t be wrong. That’s the overwhelming majority of high-ranking IT professionals that see spyware as more than a nuisance to enterprises [Web@Work research, 2004]. Estimates even put the number of desktops affected by spyware as high as 90 per cent [US National Cyber Security Alliance].
Nigel Hawthorn Dec 8 2004 1:13PM Security
Best of 2004

Best of 2004

Infosec arrives on corporate radar screens
René Millman Dec 8 2004 10:16AM Security
So are these first signs of an IT user fightback?

So are these first signs of an IT user fightback?

Jon Tullett Dec 7 2004 10:36AM Security
Time to stop hankering for the ‘good old days’

Time to stop hankering for the ‘good old days’

Illena Armstrong Dec 6 2004 5:20PM Security
Experts warn companies to outsource carefully

Experts warn companies to outsource carefully

Jon Tullett Dec 6 2004 4:46PM Security
Passwords  have finally reached their sell-by date

Passwords have finally reached their sell-by date

Robert Schifreen Dec 6 2004 4:41PM Security
The zombies are ready to attack your networks

The zombies are ready to attack your networks

Nick Barron Dec 6 2004 4:34PM Security
Public bodies not ready for new FoIA legislation

Public bodies not ready for new FoIA legislation

David Quainton Dec 6 2004 4:24PM Security

Log In

  |  Forgot your password?