Features

Review: Gordano Messaging Server

Review: Gordano Messaging Server

The Gordano Messaging Server is not an anti-spam product but a suite that includes a mail-filtering component.
Staff Writers Jun 1 2004 12:00AM Security
Review: MailMarshal for SMTP

Review: MailMarshal for SMTP

NetIQ is a familiar name in the email security space, known for its MailMarshal range.<
Staff Writers Jun 1 2004 12:00AM Security
Review: MailSite

Review: MailSite

MailSite is a fully-equipped mail server as opposed to a plug-in for Exchange or Sendmail.
Staff Writers Jun 1 2004 12:00AM Security
Review: Nemx Power Tools for Exchange 2000

Review: Nemx Power Tools for Exchange 2000

As a set of powerful content management extensions and a service to protect an Exchange server environment, Nemx Power Tools is a reasonable performer in terms of mail processing speed.<
Staff Writers Jun 1 2004 12:00AM Security
Review: Policy Patrol

Review: Policy Patrol

This application works alongside Exchange and can be installed either on the same machine or on a separate server.
Staff Writers Jun 1 2004 12:00AM Security
Review: PureMessage Small Business Edition

Review: PureMessage Small Business Edition

Sophos PureMessage 1.0
Staff Writers Jun 1 2004 12:00AM Security
Review: SurfControl Email Filter for SMTP

Review: SurfControl Email Filter for SMTP

This software was, as far as installation was concerned, a mixed bag.
Staff Writers Jun 1 2004 12:00AM Security
Review: Core Impact

Review: Core Impact

Core Impact enables an organization to conduct penetration testing as a specialist would.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Lockdown Auditor

Review: Lockdown Auditor

Lockdown Auditor is a 1U rack-mountable device that connects into a network and scans IP addresses for vulnerabilities.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: nCircle IP360

Review: nCircle IP360

If you are looking for flexibility, scalability and ease of use for vulnerability scanning and assessments, the IP360 offered by nCircle may be what you want.<
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sniffer Portable 4.7.5

Review: Sniffer Portable 4.7.5

Sniffer Portable is more than a product.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sunbelt Network Security Inspector

Review: Sunbelt Network Security Inspector

This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Typhon 3

Review: Typhon 3

Many consultancies offer services to conduct vulnerability tests against networks, but NGS is renowned for doing so.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: WebInspect

Review: WebInspect

T he depth in which websites and web services are assessed by WebInspect and its clarity of vulnerability descriptions and suggested fixes is impressive.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
User Administration with Active Directory

User Administration with Active Directory

Keeping an organization safe from potential security breaches and costly downtime involves knowing who has access to what parts of the infrastructure and how changes were made to group policies or to user account information. Many IT organizations have already made the long journey from legacy systems to Active Directory (AD) or are well on their way. Having spent time preparing for the pitfalls and pains of migrations, corporations have often forgotten why they set forth on the journey in the first place. The promise of Active Directory has always been to lower the costs of user administration, but sometimes it is unclear how best to achieve these ends. For many organizations, the two most overlooked areas are group policies and the secure delegation of tasks.
Indy Chakrabarti May 24 2004 5:48PM Security
The Issue of Compliance  - It’s Here and It’s Expanding!

The Issue of Compliance - It’s Here and It’s Expanding!

By now, most high-tech conferences have devoted at least one 30-minute session to the topic of Sarbanes-Oxley (aka “Sarbox”).
Melisa LaBancz-Bleasdale May 24 2004 5:43PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
This threat could kill e-commerce

This threat could kill e-commerce

Marcia Savage sees a storm rolling in as phishing statistics jump alarmingly and the e-commerce industry finds itself facing a collapse in public confidence
Marcia Savage May 20 2004 3:47PM Security

Log In

  |  Forgot your password?