Features

Meeting the challenges of securing your business

Meeting the challenges of securing your business

Events in the news during the past few years have taught us all many lessons. However, the primary lesson that all businessmen should have learned, is the need to keep their businesses secure in an ever changing and increasingly malevolent world. From fears about Y2K to the tragic events of September 11, the need for heighten security is readily apparent. Heightened alert is a worldwide status.
Russell Sarder Jun 15 2004 12:21PM Security
In search of a better approach to secure e-mail

In search of a better approach to secure e-mail

The volume of internet traffic generated by an ever-increasing number of applications, including e-mail, Instant Messaging (IM), web services, Voice over IP (VoIP), and other network transactions is growing unabated. Together with these applications has come an associated proliferation in the number of user identities within enterprises – e-mail addresses, IM handles, VoIP telephone numbers, all of which need to be managed. Concurrently, companies are under increasing scrutiny to adhere to government regulations and other compliance requirements to protect the privacy of customers, employees, and their personal data.
Dan Nadir Jun 15 2004 12:13PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

We began this series of articles with the observation that recent advances in the area of network technology and the success of the Internet have resulted in a new business model. This new model has resulted in a number of new challenges in the area of information security which, although largely understood, are only partially resolved. As a result, information security-related risk has been growing rapidly in the last few years and companies will need to take a more proactive stance to managing this risk in order to continue to enjoy the benefits that technological advances have made possible.
Steve Purser Jun 15 2004 12:09PM Security
Keys to addressing the data privacy mandate

Keys to addressing the data privacy mandate

Enterprises worldwide are spending approximately $20 billion per year on IT security, yet very costly breaches continue to occur. In large part, this is because security efforts have mainly been focused on network security rather than data privacy. Data privacy is the process of securing critical data as it is being stored, transmitted, and used within the enterprise.
Randy Budde Jun 8 2004 12:02PM Security
The case for intrusion prevention

The case for intrusion prevention

There have been many cases reported in both trade and national press recently about the increasing threat of cyber attacks, and the methodology employed to exploit vulnerabilities in security implementations. Despite this increased emphasis on the reality of the threat, many organisations are ignoring the advances in security products and technologies that can significantly increase their resistance to these attacks.
Paul Lawrence Jun 8 2004 11:42AM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

Previous articles in this series have outlined the challenges facing the present-day information security manager, presented an approach to meeting these challenges and analysed the purpose of the consolidation phase in some detail. We now turn our eyes to the second phase of the approach – the strategic planning cycle.
Steve Purser Jun 8 2004 11:37AM Security
Review: Fireball CyberProtection Suite

Review: Fireball CyberProtection Suite

It has taken a while for smaller businesses to acknowledge the importance of securing networks.
Robert Gates Jun 5 2004 12:00AM Security
Review: SecureLogin Single Sign-On

Review: SecureLogin Single Sign-On

We are all familiar with the concept of single sign-on, where a user undertakes a single authentication process for access to multiple applications, thus significantly reducing the password nightmare which is a reality for many enterprise users.
Julian Ashbourn Jun 5 2004 12:00AM Security
Review: F-Secure Policy Manager

Review: F-Secure Policy Manager

System administrators used to wish this sort of tool existed.
Ben Till Jun 5 2004 12:00AM Security
Review: Dynamic Network Administration

Review: Dynamic Network Administration

This product is not designed to be a patch management application, but its software distribution capabilities can be used to roll out fixes, updates and service packs.<
Eric Doyle Jun 4 2004 12:00AM Security
Review: HFNetChkPro

Review: HFNetChkPro

HFNetChkPro might well suffer from having a dreadful name, but it boasts a top technical pedigree.
Eric Doyle Jun 4 2004 12:00AM Security
Review: Security Update Manager

Review: Security Update Manager

An add-on to Configuresoft's Enterprise Configuration Manager (ECM) is the Security Update Manager (SUM).
Eric Doyle Jun 4 2004 12:00AM Security
Review: Service Pack Manager 2000

Review: Service Pack Manager 2000

This is an agentless patch manager for Microsoft products that installs in minutes.
Eric Doyle Jun 4 2004 12:00AM Security
Review: Patch Management Solution

Review: Patch Management Solution

This is a plug-in module in a family of management modules and servers organized into suites targeting application areas.
Eric Doyle Jun 4 2004 12:00AM Security
Review: PatchLink

Review: PatchLink

Life was made easier by PatchLink Update's ability to configure the Internet Information Services (IIS) server and Microsoft Desktop Engine database, and also by the administrator's ability to share patching responsibilities.<
Eric Doyle Jun 4 2004 12:00AM Security
Review: LANDesk Patch Manager

Review: LANDesk Patch Manager

This is an add-on module for the LANDesk Management Suite 8, which could explain why it needs at least five patch management-related components on each monitored machine.
Eric Doyle Jun 4 2004 12:00AM Security
Review: LANGuard Network Security Scanner

Review: LANGuard Network Security Scanner

This is a security scanner that includes patch management.
Eric Doyle Jun 4 2004 12:00AM Security
Review: BigFix Enterprise Suite Patch Manager

Review: BigFix Enterprise Suite Patch Manager

This product is part of a larger management system, the BigFix Enterprise Suite (BES).
Eric Doyle Jun 4 2004 12:00AM Security
Review: BigFix Enterprise Suite Patch Manager

Review: BigFix Enterprise Suite Patch Manager

This product is part of a larger management system, the BigFix Enterprise Suite (BES).
Eric Doyle Jun 4 2004 12:00AM Security
Review: Ecora Patch Manager

Review: Ecora Patch Manager

This is ideal to apply patches quickly and effectively.
Eric Doyle Jun 4 2004 12:00AM Security

Log In

  |  Forgot your password?