Features

Security is more than tools – it is a total plan

Security is more than tools – it is a total plan

Spam is more than a simple time and bandwidth drain. It is a problem that many organizations are having a tough time eradicating.
Illena Armstrong Jun 1 2004 3:17PM Security
Get it right the first time

Get it right the first time

Mary Ann Davidson favors detecting and eliminating vulnerabilities early in the software development cycle
Mary Ann Jun 1 2004 2:52PM Security
Together is much better

Together is much better

Gunter Ollmann explains how clients and consultants can work side by side for maximum assessment results
Gunter Ollmann Jun 1 2004 2:47PM Security
Partnerships for protection

Partnerships for protection

Marcia Savage asks IT heads of four California counties how the ISF document has strengthened security
Marcia Savage Jun 1 2004 2:42PM Security
Counties dance to Dickey’s tune

Counties dance to Dickey’s tune

Kevin Dickey, CISO for Contra Costa County, founded a group that has brought security issues to the fore for California county governments. Marcia Savage sees how his ideas have struck a chord throughout the state
Marcia Savage Jun 1 2004 2:37PM Security
Security through compartmentalisation

Security through compartmentalisation

Whether you call it layered perimeter defences, virtual teams, secure compartments, secure enclaves, or even virtual LANs, the concepts share the same goals: isolate and protect information assets from unauthorised access using more than single perimeter protection.
James Janisse Jun 1 2004 12:23PM Security
Why spammers spam

Why spammers spam

With over 65 per cent of all e-mail traffic circulating on the internet today being spam, there must be reasons why people choose this particular career path and risk arrest as well as being labeled as a spammer.
Francois Bourdeau Jun 1 2004 12:14PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic planning cycle. We continue this development by taking a more detailed look at the consolidation period.
Steve Purser Jun 1 2004 12:01PM Security
Review: Flagstone Encrypted Hard Disk

Review: Flagstone Encrypted Hard Disk

Securing data when it leaves an organisation is always a problem. Despite user education, a laptop can all too easily be left in a cab and, if not properly secure, information is left in the clear for all to see. Even when software encryption is used, there is still a chance that it can be decrypted.

René Millman Jun 1 2004 12:00AM Security
Review: MailMarshal for SMTP

Review: MailMarshal for SMTP

NetIQ is a familiar name in the email security space, known for its MailMarshal range.<
Staff Writers Jun 1 2004 12:00AM Security
Review: MailSite

Review: MailSite

MailSite is a fully-equipped mail server as opposed to a plug-in for Exchange or Sendmail.
Staff Writers Jun 1 2004 12:00AM Security
Review: Nemx Power Tools for Exchange 2000

Review: Nemx Power Tools for Exchange 2000

As a set of powerful content management extensions and a service to protect an Exchange server environment, Nemx Power Tools is a reasonable performer in terms of mail processing speed.<
Staff Writers Jun 1 2004 12:00AM Security
Review: Policy Patrol

Review: Policy Patrol

This application works alongside Exchange and can be installed either on the same machine or on a separate server.
Staff Writers Jun 1 2004 12:00AM Security
Review: PureMessage Small Business Edition

Review: PureMessage Small Business Edition

Sophos PureMessage 1.0
Staff Writers Jun 1 2004 12:00AM Security
Review: SurfControl Email Filter for SMTP

Review: SurfControl Email Filter for SMTP

This software was, as far as installation was concerned, a mixed bag.
Staff Writers Jun 1 2004 12:00AM Security
Review: Core Impact

Review: Core Impact

Core Impact enables an organization to conduct penetration testing as a specialist would.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Lockdown Auditor

Review: Lockdown Auditor

Lockdown Auditor is a 1U rack-mountable device that connects into a network and scans IP addresses for vulnerabilities.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: nCircle IP360

Review: nCircle IP360

If you are looking for flexibility, scalability and ease of use for vulnerability scanning and assessments, the IP360 offered by nCircle may be what you want.<
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sniffer Portable 4.7.5

Review: Sniffer Portable 4.7.5

Sniffer Portable is more than a product.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sunbelt Network Security Inspector

Review: Sunbelt Network Security Inspector

This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn Jun 1 2004 12:00AM Security

Log In

  |  Forgot your password?