Features

More big players jostle for position in SCM field

More big players jostle for position in SCM field

The leaders in secure content management (SCM) software are Symantec, Network Associates and Trend Micro. According to IDC’s Market Analysis: Worldwide Secure Content Management Forecast Update and Competitive Vendor Shares, 2002-2007, they have a market share of $1.7 billion (the worldwide revenue for SCM software hit $2.7 billion by 2002).
Illena Armstrong Apr 15 2004 10:04AM Security
Taking synergy to a higher level

Taking synergy to a higher level

Physical and IT security are unlikely bedfellows, but now Barbara Gengler discovers signs of a budding romance
Barbara Gengler Apr 13 2004 4:35PM Security
Why pink and fluffy are the new watchwords

Why pink and fluffy are the new watchwords

When the speaker at the front of the room announced that security was really about “pink, fluffy stuff,” I started looking for the exit. And I am sure I was not the only one.
Ron Condon Apr 13 2004 4:27PM Security
It’s crunch time for cybercrime

It’s crunch time for cybercrime

Fighting extortion, paedophilia and identity theft is all in a day’s work for the National Hi-Tech Crime Unit. Dan Ilett talks to its head, Len Hynds.
Dan Ilett Apr 13 2004 3:14PM Security
Worms expose security secrets

Worms expose security secrets

With the proliferation of worms being bred to attack your security, patch management is becoming increasingly time consuming. Ron Condon asks if there is an easier way
Ron Condon Apr 13 2004 3:14PM Security
Review: SSH Tectia Server and Client

Review: SSH Tectia Server and Client

Many products in this test focus on securing locally stored (or local network) data via encryption techniques.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: NMS for PC/PDA

Review: NMS for PC/PDA

This product has Professional or Enterprise editions and the latter has the Management Suite that features remote recovery management for forgotten passwords, mass deployment and more.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: SafeGuard Private Disk/SafeGuard Easy

Review: SafeGuard Private Disk/SafeGuard Easy

SafeGuard Private Disk and SafeGuard Easy are well considered and professionally presented.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: SecureDoc

Review: SecureDoc

SecureDoc looks innocent and basic in its DVD-sized packaging containing a CD, a Rainbow 2000 series USB token and a weak-looking installation and setup guide.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: Office Guard

Review: Office Guard

Office Guard contrasts with many products in this test because it targets Microsoft Office users to help them make sense of PKI.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: PGP Universal/Desktop

Review: PGP Universal/Desktop

The PGP desktop products (version 8.0
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: SafeBoot

Review: SafeBoot

SafeBoot is a capable, enterprise-level product for the serious user/organization prepared to commit to a specific security architecture to protect the data on its machines.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: Steganos Safe 6

Review: Steganos Safe 6

Steganos Safe 6 is an intriguing product based on a simple idea.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: DbEncrypt/AppDetective

Review: DbEncrypt/AppDetective

The software supplied covered DbEncrypt for Microsoft SQL, DbEncrypt for Oracle and AppDetective.
Julian Ashbourn Apr 7 2004 12:00AM Security
Review: DESlock+

Review: DESlock+

DESlock+ is nicely presented in a box with the software, a ring-bound manual and two USB tokens.
Julian Ashbourn Apr 7 2004 12:00AM Security
Putnam group releases infosec recommendations

Putnam group releases infosec recommendations

A group formed by Rep. Adam Putnam (R-Florida) last fall to study alternatives to cybersecurity legislation released its recommendations Tuesday.
Marcia Savage Apr 6 2004 11:21PM Security
Linux or Windows: Which is more vulnerable?

Linux or Windows: Which is more vulnerable?

After examining security vulnerability data over the last year, Forrester Research has determined that both Windows and Linux can be deployed securely, but vendors need to ensure they address several criteria to make this process easier.
Illena Armstrong Apr 6 2004 10:05PM Security
Sobering up over the weekend

Sobering up over the weekend

A new variant of the Sober worm, Sober-F worm (W32/Sober-F), is in the wild.
Illena Armstrong Apr 6 2004 7:59PM Security
In-house, within budget

In-house, within budget

We all love a bargain, so Don Parker advises how to make big savings in your network security training budget
Don Parker Apr 5 2004 4:57PM Security
Consultants view: This intrusion is no test

Consultants view: This intrusion is no test

Gunter Ollmann explains why test environments are a security weakness in need of some serious attention
Gunter Ollmann Apr 5 2004 4:36PM Security

Log In

  |  Forgot your password?