Features

Review: LANDesk Asset Manager

Review: LANDesk Asset Manager

LANDesk Asset Manager – actually an add-in to the comprehensive LANDesk Management Suite 8.1 application – provides a host of valuable functionality.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Altiris Asset Management Suite

Review: Altiris Asset Management Suite

Altiris speaks in terms of "lifecycle management," by which it means managing your IT-related assets throughout their useful term of operation. This is enabled by the provision of a core Notification Server, to which might be added a Server Provisioning Suite, a Client Management Suite , (CMS), and an Asset Management Suite, (AMS). The Altiris brochure also describes a utility named the Wise Package Studio which, as you might expect, provides for software distribution.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Centennial Discovery

Review: Centennial Discovery

Centennial Discovery 4.51 is a comprehensive, but easy to use, auditing tool which might be used with a variety of client operating systems. It requires Microsoft SQL Server 7.0 or later, a run-time version of which is supplied on the installation CD.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: iInventory

Review: iInventory

This product is a straightforward and competent auditing tool whose apparent simplicity and ease of use will appeal to many system administrators.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Intuit Track-It!

Review: Intuit Track-It!

Intuit Track-It! is a comprehensive suite of integrated modules which provide some interesting and useful functionality. The product is available in three flavours of Single User, Standard (facilitating multiple users) and Enterprise, and is nicely presented throughout with good documentation.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: PC-Duo Enterprise

Review: PC-Duo Enterprise

PC-Duo Enterprise is a well presented application that effectively steers users through all major functions via well-considered dialogs. This "learn-as-you-go" approach will suit the busy network administrator with limited previous experience.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Security Expressions

Review: Security Expressions

This is a very interesting application which enables you to monitor compliance with policies via audits against your IT infrastructure. This alone would represent valuable functionality, but Security Expressions does not stop there.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: TS Census – License Compliance Suite

Review: TS Census – License Compliance Suite

Praise be! A software vendor that supplies a comprehensive and well-written printed product manual, and a host of other documentation to leave you in no doubt about the product, and how best to use it.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Unicenter

Review: Unicenter

Installing Unicenter takes a little longer than average, but the process is glitch-free and logical, setting the tone for the use of the product.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Ghost Corporate Edition

Review: Ghost Corporate Edition

One of the

Eric Doyle Aug 2 2004 12:00AM Security
Review: Pervasive AuditMaster

Review: Pervasive AuditMaster

Pervasive's SQL database is designed to be embedded in applications designed for small to medium businesses. AuditMaster has been created to ensure that changes to the database are efficiently and accurately logged. The audit trail produced not only allows the database manager to keep track of routine changes, but also sends alerts if and when key data, such as staff salaries or catalog prices, are altered.

Eric Doyle Aug 2 2004 12:00AM Security
Review: FileAssurity OpenPGP Command Line Scriptor

Review: FileAssurity OpenPGP Command Line Scriptor

Encrypting files while becoming a necessary part of security has remained somewhat of complex beast to understand and perform. This product aims to strip away the hard work of encrypting batches of files coing into and going out of the enterprise.

René Millman Jul 30 2004 12:00AM Security
Open source. Love it or hate it, but can you trust it?

Open source. Love it or hate it, but can you trust it?

Open source software (OSS) is firmly entrenched in the infrastructure of the Internet, and is now making inroads into the security market too. But although the darling of techies everywhere, OSS has its doubters. In particular, many corporate managers have concerns about support, accountability, and longevity.
Jon Tullett Jul 28 2004 11:15AM Security
The open network, or an open door to prosecution?

The open network, or an open door to prosecution?

The last decade has seen organizations of all types and sizes investing huge sums in establishing sophisticated computer networks, aimed at enabling employees to better meet customers’ needs and create a competitive edge.
Glenn Stephens Jul 27 2004 5:51PM Security
Making customers jump through hoops

Making customers jump through hoops

The purpose of multi-channel banking is to make things easier for the customer to access his or her account wherever and whenever they need to. However, with the increasing number of channels coming on stream, the architecture is becoming much more complicated and expensive to administer for banks and building societies.
Steve Keohane Jul 27 2004 5:25PM Security
Review: Crypto Anywhere

Review: Crypto Anywhere

Encrypting email is a must for the paranoid among us, and Crypto Anywhere provides the tools necessary to encrypt and decrypt email messages. Among its new features are Outlook integration and the ability to create an executable that can run off a floppy or flash disk, thereby circumventing the need to install software on a terminal when using Crypto Anywhere in an internet café.

René Millman Jul 23 2004 12:00AM Security
Review: BitZipper

Review: BitZipper

It would seem that compression and encryption are fast becoming the best of friends. BitZipper is the latest in a line of compression applications trying to eat away at WinZip's dominance by adding high-grade encryption into the deal.

The software prides itself on its ability to deal with more compression file types than WinZip as well as 256-bit AES encryption (which can be found in WinZip 9.0). Setting up is easy enough and offers a wizard just as WinZip does. The installation is slightly less convoluted than WinZip.

René Millman Jul 21 2004 12:00AM Security
Spam – what's the solution?

Spam – what's the solution?

The problem of spam hardly needs an introduction. It is a time-waster for recipients. It has its sinister side in the form of V-spam and phishing. And it consumes infrastructure resources -- especially bandwidth. The only real solution available today is blocking: either at the recipients' premises or, sometimes, at the recipients' ISP. But this feels very much like locking the stable door after the horse has bolted and there must be a better alternative.
Bob Jones Jul 20 2004 4:47PM Security
The insider threat

The insider threat

Today, computer networks of many companies look like a well-guarded military fortress.
Omon Edeki Jul 20 2004 4:43PM Security
Downtime is now a matter of choice

Downtime is now a matter of choice

The current perception of IT management and users alike is that downtime of critical servers and their associated applications is just an unfortunate fact of life.
Neil Robertson Jul 20 2004 4:38PM Security

Log In

  |  Forgot your password?