Features

Review: Sniffer Portable 4.7.5

Review: Sniffer Portable 4.7.5

Sniffer Portable is more than a product.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Sunbelt Network Security Inspector

Review: Sunbelt Network Security Inspector

This is a vulnerability scanner for Microsoft operating systems and applications.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Typhon 3

Review: Typhon 3

Many consultancies offer services to conduct vulnerability tests against networks, but NGS is renowned for doing so.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: WebInspect

Review: WebInspect

T he depth in which websites and web services are assessed by WebInspect and its clarity of vulnerability descriptions and suggested fixes is impressive.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: Flagstone Encrypted Hard Disk

Review: Flagstone Encrypted Hard Disk

Securing data when it leaves an organisation is always a problem. Despite user education, a laptop can all too easily be left in a cab and, if not properly secure, information is left in the clear for all to see. Even when software encryption is used, there is still a chance that it can be decrypted.

René Millman Jun 1 2004 12:00AM Security
Review: DynaComm i:mail

Review: DynaComm i:mail

DynaComm i:mail is software made to monitor, filter and log email activity passing through the corporate SMTP server.
Staff Writers Jun 1 2004 12:00AM Security
Review: Gordano Messaging Server

Review: Gordano Messaging Server

The Gordano Messaging Server is not an anti-spam product but a suite that includes a mail-filtering component.
Staff Writers Jun 1 2004 12:00AM Security
Review: Barracuda Spam Firewall 600

Review: Barracuda Spam Firewall 600

Barracuda's Spam Firewall is a 1U appliance running Linux and offering SMTP services with a good selection of mail filters to keep the junk mail out.<
Staff Writers Jun 1 2004 12:00AM Security
Review: Cloudmark Authority

Review: Cloudmark Authority

Cloudmark Authority runs on Linux, hooking the Milter interface of Sendmail to parse each message prior to delivery.
Staff Writers Jun 1 2004 12:00AM Security
Review: iHateSpam for Exchange

Review: iHateSpam for Exchange

Once installed and running, iHateSpam for Exchange performed quite well, but the installation got off to a rocky start.<
Staff Writers Jun 1 2004 12:00AM Security
Review: IronMail

Review: IronMail

CipherTrust's IronMail appliance offers an impressive collection of features for mail security.
Staff Writers Jun 1 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
User Administration with Active Directory

User Administration with Active Directory

Keeping an organization safe from potential security breaches and costly downtime involves knowing who has access to what parts of the infrastructure and how changes were made to group policies or to user account information. Many IT organizations have already made the long journey from legacy systems to Active Directory (AD) or are well on their way. Having spent time preparing for the pitfalls and pains of migrations, corporations have often forgotten why they set forth on the journey in the first place. The promise of Active Directory has always been to lower the costs of user administration, but sometimes it is unclear how best to achieve these ends. For many organizations, the two most overlooked areas are group policies and the secure delegation of tasks.
Indy Chakrabarti May 24 2004 5:48PM Security
The Issue of Compliance  - It’s Here and It’s Expanding!

The Issue of Compliance - It’s Here and It’s Expanding!

By now, most high-tech conferences have devoted at least one 30-minute session to the topic of Sarbanes-Oxley (aka “Sarbox”).
Melisa LaBancz-Bleasdale May 24 2004 5:43PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
This threat could kill e-commerce

This threat could kill e-commerce

Marcia Savage sees a storm rolling in as phishing statistics jump alarmingly and the e-commerce industry finds itself facing a collapse in public confidence
Marcia Savage May 20 2004 3:47PM Security
Third party or third rate?

Third party or third rate?

Gunter Ollmann shows why each organization should assess the security of its third-party hosting providers
Gunter Ollmann May 20 2004 3:47PM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security

Log In

  |  Forgot your password?