Features

Review: Security Expressions

Review: Security Expressions

This is a very interesting application which enables you to monitor compliance with policies via audits against your IT infrastructure. This alone would represent valuable functionality, but Security Expressions does not stop there.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: TS Census – License Compliance Suite

Review: TS Census – License Compliance Suite

Praise be! A software vendor that supplies a comprehensive and well-written printed product manual, and a host of other documentation to leave you in no doubt about the product, and how best to use it.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Unicenter

Review: Unicenter

Installing Unicenter takes a little longer than average, but the process is glitch-free and logical, setting the tone for the use of the product.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Ghost Corporate Edition

Review: Ghost Corporate Edition

One of the

Eric Doyle Aug 2 2004 12:00AM Security
Review: Pervasive AuditMaster

Review: Pervasive AuditMaster

Pervasive's SQL database is designed to be embedded in applications designed for small to medium businesses. AuditMaster has been created to ensure that changes to the database are efficiently and accurately logged. The audit trail produced not only allows the database manager to keep track of routine changes, but also sends alerts if and when key data, such as staff salaries or catalog prices, are altered.

Eric Doyle Aug 2 2004 12:00AM Security
Review: FileAssurity OpenPGP Command Line Scriptor

Review: FileAssurity OpenPGP Command Line Scriptor

Encrypting files while becoming a necessary part of security has remained somewhat of complex beast to understand and perform. This product aims to strip away the hard work of encrypting batches of files coing into and going out of the enterprise.

René Millman Jul 30 2004 12:00AM Security
Open source. Love it or hate it, but can you trust it?

Open source. Love it or hate it, but can you trust it?

Open source software (OSS) is firmly entrenched in the infrastructure of the Internet, and is now making inroads into the security market too. But although the darling of techies everywhere, OSS has its doubters. In particular, many corporate managers have concerns about support, accountability, and longevity.
Jon Tullett Jul 28 2004 11:15AM Security
The open network, or an open door to prosecution?

The open network, or an open door to prosecution?

The last decade has seen organizations of all types and sizes investing huge sums in establishing sophisticated computer networks, aimed at enabling employees to better meet customers’ needs and create a competitive edge.
Glenn Stephens Jul 27 2004 5:51PM Security
Making customers jump through hoops

Making customers jump through hoops

The purpose of multi-channel banking is to make things easier for the customer to access his or her account wherever and whenever they need to. However, with the increasing number of channels coming on stream, the architecture is becoming much more complicated and expensive to administer for banks and building societies.
Steve Keohane Jul 27 2004 5:25PM Security
Review: Crypto Anywhere

Review: Crypto Anywhere

Encrypting email is a must for the paranoid among us, and Crypto Anywhere provides the tools necessary to encrypt and decrypt email messages. Among its new features are Outlook integration and the ability to create an executable that can run off a floppy or flash disk, thereby circumventing the need to install software on a terminal when using Crypto Anywhere in an internet café.

René Millman Jul 23 2004 12:00AM Security
Review: BitZipper

Review: BitZipper

It would seem that compression and encryption are fast becoming the best of friends. BitZipper is the latest in a line of compression applications trying to eat away at WinZip's dominance by adding high-grade encryption into the deal.

The software prides itself on its ability to deal with more compression file types than WinZip as well as 256-bit AES encryption (which can be found in WinZip 9.0). Setting up is easy enough and offers a wizard just as WinZip does. The installation is slightly less convoluted than WinZip.

René Millman Jul 21 2004 12:00AM Security
Spam – what's the solution?

Spam – what's the solution?

The problem of spam hardly needs an introduction. It is a time-waster for recipients. It has its sinister side in the form of V-spam and phishing. And it consumes infrastructure resources -- especially bandwidth. The only real solution available today is blocking: either at the recipients' premises or, sometimes, at the recipients' ISP. But this feels very much like locking the stable door after the horse has bolted and there must be a better alternative.
Bob Jones Jul 20 2004 4:47PM Security
The insider threat

The insider threat

Today, computer networks of many companies look like a well-guarded military fortress.
Omon Edeki Jul 20 2004 4:43PM Security
Downtime is now a matter of choice

Downtime is now a matter of choice

The current perception of IT management and users alike is that downtime of critical servers and their associated applications is just an unfortunate fact of life.
Neil Robertson Jul 20 2004 4:38PM Security
The business of utilizing an IDS

The business of utilizing an IDS

Andrew Wilson explains why fancy intrusion detection technology is worth little if it is not supported by sound, mindful business decisions
Andrew Wilson Jul 15 2004 11:58AM Security
The holistic approach

The holistic approach

Rajesh Patel explains why devices, policies and people are all elements of optimal and total network security
Rajesh Patel Jul 15 2004 11:43AM Security
The four phases of SEM

The four phases of SEM

Jim McGrath explains how to collect, analyze, correlate and respond for complete security event management
Jim McGrath Jul 15 2004 11:38AM Security
As easy as one, two, ten

As easy as one, two, ten

A solid cybersecurity program requires more than three steps, but Paul Kurtz thinks they are surely worth it
A solid Jul 15 2004 11:26AM Security
It’s always the right time

It’s always the right time

Gunter Ollmann explains how security can be assessed at each phase of the application development lifecycle
Gunter Ollmann Jul 15 2004 11:20AM Security
Top 10 techniques to control spam for the enterprise

Top 10 techniques to control spam for the enterprise

Spam within the enterprise has undoubtedly evolved from an annoyance to a critical business problem. No approach to spam can work in isolation as unlike viruses, no single technology is able to stem the tide. I believe that by utilising the following top ten techniques an organisation can arm itself successfully against the menace of spam.
Colin Gray Jul 13 2004 2:52PM Security

Log In

  |  Forgot your password?