Features

The need to define malware

The need to define malware

It is a problem of legend within the computing industry that, surprisingly, there is no universally accepted definition of the term 'computer virus'.
David Perry Oct 13 2004 11:27AM Security
The dangers of metadata

The dangers of metadata

Imagine the scene: you are sitting at your desk copying a pasting some new information into a company template. All the old content has been removed and the new detail has been inputted. The document is ready to go and gets sent out as an email attachment. But stop! Do you know that the document you have just sent contains all the confidential information you thought had been deleted? This invisible detail is called metadata.
Joe Fantuzzi Oct 13 2004 11:24AM Security
Review: Ideal Administration

Review: Ideal Administration

This application offers centralised control and administration for Windows domain. It does this by putting all the essential tools needed to manage domains, computers, users and groups in one place.

René Millman Oct 12 2004 12:00AM Security
Identity Management: A Key Enabler of IT-Business Alignment

Identity Management: A Key Enabler of IT-Business Alignment

As technologies have improved and the value of the Internet to business has exploded because of technologies like Java and XML, the abilities of vendors to graphically and accurately represent the status of hardware, network and application components became much more robust.
Gary Holland Oct 6 2004 3:36PM Security
Balancing security products with management time: are you stretching yourself too thin?

Balancing security products with management time: are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Oct 6 2004 3:36PM Security
How valuable is your data?

How valuable is your data?

We have seen it in ‘The Thomas Crown Affair’ and ‘Star Wars’ and countless other movies. But could it happen in real life? Could a fraudster posing as somebody else easily get their hands on valuable assets?
Joanna Shields Oct 6 2004 3:36PM Security
Review: BioDisk Biometric Flash Disk

Review: BioDisk Biometric Flash Disk

USB portable storage devices (or "sticks" as otherwise known) have become very popular as a handy means of carrying around your data, but what happens when you misplace the device? How safe is your data? OK, you could encrypt all the files on the device, but many users will simply not bother.

Julian Ashbourn Oct 6 2004 12:00AM Security
Review: DigitalPersona Pro for Active Directory

Review: DigitalPersona Pro for Active Directory

DigitalPersona Pro (formerly U are U Pro) for Active Directory is now at version 3.0 (the vendor tells us version 3.1 is now available) and is as slick as ever in its presentation, installation and general ease of use.

Julian Ashbourn Oct 6 2004 12:00AM Security
Review: SafeGuard PDA Enterprise

Review: SafeGuard PDA Enterprise

This might appear to be a slightly unusual product to include in this group test, but it qualifies as a potential biometric due to the use of signature verification, or fingerprints where applicable.

Julian Ashbourn Oct 6 2004 12:00AM Security
Review: SAFsolution Workstation Bundle

Review: SAFsolution Workstation Bundle

Saflink is a well-known and well-respected company within the biometrics arena, with many successful customized implementations to its credit. It seems like a natural progression, therefore, for it to bring its experience and expertise to the broader commercial product area.

Julian Ashbourn Oct 6 2004 12:00AM Security
Review: SecuGen Hamster III

Review: SecuGen Hamster III

This device is an exquisite little fingerprint reader with immediate visual and tactile appeal. Manufactured in Korea, it has been cleverly designed to offer flexibility of placement.

Julian Ashbourn Oct 6 2004 12:00AM Security
Review: SecuGen OptiMouse III

Review: SecuGen OptiMouse III

The SecuGen Mouse takes a different approach to providing fingerprint biometric logon facilities, in that it combines a good-quality optical fingerprint reader with an equally good-quality optical mouse.

Julian Ashbourn Oct 6 2004 12:00AM Security
Review: DiskNet Pro 4

Review: DiskNet Pro 4

A lot of companies are shouting that the next big threat to organizations will come from within – a problem that security professionals have known about for a very long time. As long as people are fallible, they will be tempted to look at things they shouldn't or steal things from the companies they work for. So with that in mind, something should be done to keep data from slipping out in pockets and handbags.

René Millman Oct 6 2004 12:00AM Security
Review: Enterasys Networks Wireless Access Point 3000

Review: Enterasys Networks Wireless Access Point 3000

No security professional in their right mind would consider embarking on installing wireless access points (APs) in the enterprise without making sure they had some form of protection.

René Millman Oct 6 2004 12:00AM Security
Review: AirDefense Enterprise

Review: AirDefense Enterprise

As wireless networks grow in popularity, many security professionals are justly worried about the ease in which non-technical users can set up and operate wireless networks. Also securing wireless infrastructures can be tricky, because the set up of wireless networks can be problematical and not as secure as one might think.

Jon Stearn Oct 6 2004 12:00AM Security
Review: Datakey Axis

Review: Datakey Axis

Set any group of business IT users talking and it will not be long before the subject of passwords and application access control crops up. The "I have more passwords than you" debate will then take place, followed by some imaginative suggestions for getting around the system, together with colorful observations about the relative effectiveness of passwords in any event.

Julian Ashbourn Oct 6 2004 12:00AM Security
What can software asset management do for me?

What can software asset management do for me?

‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher Sep 29 2004 11:18AM Security
The risks of outsourcing

The risks of outsourcing

What if you learned that your closest competitor had an indirect network connection to your company? Would you be worried? If you outsource any aspect of your company's functions, and that outsourcing vendor has your competitor as a customer, an indirect link may exist.
Benny Jones Sep 29 2004 11:18AM Security
Following protocol

Following protocol

The virtual private network (VPN) is now a widely accepted feature of corporate IT security – and SSL is gaining on the established IPSec standard as the most popular VPN security protocol. How do they stack up?
David Lynch Sep 29 2004 11:18AM Security
Significance of Common Criteria Assurance Maintenance (AMA)

Significance of Common Criteria Assurance Maintenance (AMA)

Certificate Assurance Maintenance (AMA) is an extension to the Common Criteria (CC) Certification Scheme, by which vendors who have previously CC certified their product at a specific revision continue to maintain the same level of assurance their original certification offers their customers, as new revisions of the product are introduced.
Soheila Amiri Sep 22 2004 3:12PM Security

Log In

  |  Forgot your password?