Features

Review: Wireless PC Lock

Review: Wireless PC Lock

If pressing Ctrl+Alt+Del to lock Windows every time the weary computer user leaves their desk proves too much of a strain then this new device from Sitecom could be just the ticket.

The Wireless PC Lock is billed as a convenient aid for protecting personal details and programs when away from the PC or laptop. A receiver is connected via a USB port to the computer while a transmitter is placed upon the person. Should the transmitter and receiver be more than two metres apart then the PC will lock.

René Millman Mar 8 2004 12:00AM Security
Review: WipeDrive

Review: WipeDrive

When old computers reach the end of their useful life within an organisation, many an IT professional immediately has thoughts of charity on their mind and donating an old computer means someone else can use it to gain skills or keep in contact with the outside world.

However, this is not without its problems. No-one in their right mind would donate the CEO's old desktop without deleting important data such as financial records or confidential emails. Reformatting the disk does not erase this data permanently.

René Millman Mar 6 2004 12:00AM Security
Review: Prestige 652H-31

Review: Prestige 652H-31

This type of ADSL router is becoming more popular as branch offices look for all-in-one boxes that provide access to the wire and wireless user. 

René Millman Feb 20 2004 12:00AM Security
Email stamps could nix spam

Email stamps could nix spam

A San Francisco-based think-tank believes the way to solve spam overload is to start charging to send email.
Illena Armstrong Feb 13 2004 12:25PM Security
Move over DHS, another alerting service on offer

Move over DHS, another alerting service on offer

About two weeks after the Department of Homeland Security recently announced an improved National Cyber Alert System, St. Bernard Software Inc. has unveiled free alerting services of its own to keep users up to date on the newest Microsoft-based security threats and patches.
Illena Armstrong Feb 13 2004 12:21PM Security
Get prepared to avoid downtime

Get prepared to avoid downtime

The need for business continuity has never been more apparent. The threat of terrorism has heightened awareness of the business implications of major disasters, while in the US, recent power ‘outages’ – and the worry they could be replicated in the UK – has prompted some organisations to assess the business implications of major disruption.
Graeme Howe Feb 12 2004 6:50PM Security
Get prepared to avoid downtime

Get prepared to avoid downtime

Fires, power outages, cyberattacks. Natural and man-made disasters threaten every company, but in this increasingly internet-dependent economy, downtime and the losses caused by it are a major concern.
Marcia Savage Feb 12 2004 6:39PM Security
Cybersecurity’s new power surge

Cybersecurity’s new power surge

Before he left his post as White House cyberspace security advisor last May, Howard Schmidt promised top federal officials that he would create a greater leadership role in the private sector on cybersecurity.
Marcia Savage Feb 12 2004 6:27PM Security
Only authorized users welcome

Only authorized users welcome

With internal attacks on systems becoming ever more frequent, and the necessity for data accuracy increasing under corporate compliance legislation, I decided it was time to examine whether centralized user provisioning could secure information cost-effectively.
Neil Chaney Feb 12 2004 6:17PM Security
This government can’t keep pointing fingers

This government can’t keep pointing fingers

The Department of Homeland Security (DHS) was one of eight federal agencies that scored an F on the most recent Federal Computer Security report card. That's scary and funny all at once.
Illena Armstrong Feb 12 2004 5:54PM Security
Trustworthy Computing must include browsers

Trustworthy Computing must include browsers

What is Microsoft thinking of? The company’s laudable goals of Trustworthy Computing have seen great strides made in much of its software, its patching process is improving and security-specific products like ISA Server are getting steadily better. But the firm seems to be having huge difficulty fixing fundamental flaws in Internet Explorer, flaws that are being actively exploited by criminals, and is now considering abandoning standards in what appear to be increasingly desperate attempts to secure the browser.
Jon Tullett Feb 12 2004 5:42PM Security
Review: Secure Access Manager

Review: Secure Access Manager

This product provides users with SSO and administrators with a centralized way of managing the applications and resources that a user can access. It uses a centralized Policy Server and security plug-ins on user workstations and it authenticates users at first login with a choice, or combination, of password, Radius, token, certificate, smartcard or biometric authentication methods.

Geoff Marshall Feb 12 2004 12:00AM Security
Companies combine to face biometric challenge

Companies combine to face biometric challenge

Security firms De La Rue Identity Systems and BioDentity Systems have teamed up to provide international travel document and border clearance solutions that work using biometrics.
Dan Ilett Feb 9 2004 4:51PM Security
Review: Trinity Secure Sign-On

Review: Trinity Secure Sign-On

Trinity is designed to allow enterprises to protect sign-on with smartcards, fingerprint biometrics, hardware tokens, passwords, or a combination of these methods.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: BinTec X2300

Review: BinTec X2300

While just about every company has a connection to the internet in one form or another, not everyone has a failover option to go back to dial-up or ISDN. Fewer still have VPN or indeed a proper firewall to ensure the lines of communication are secure.

René Millman Feb 1 2004 12:00AM Security
Review: Vintela Authentication from SCO

Review: Vintela Authentication from SCO

Not strictly a single sign-on (SSO) product,Vintela Authentication is designed to provide a more cost-effective solution than SSOs to the problem of users having different login credentials to Windows and UNIX resources.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Corporate Server

Review: Corporate Server

SmoothWall Corporate Server enables non-technical users to build a dedicated firewall to connect a network of computers to the internet. This software solution is designed to be cost-effective, because almost any Pentium-class PC can be used as the dedicated hardware platform. This firewall has been developed to meet the internet security needs of small to medium-sized organizations, corporate branch offices, and individuals with demanding security needs.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Safe@Office

Review: Safe@Office

For anyone connecting to the internet, security has long been an issue. However, for many small businesses, the cost of security has also been a big issue and a heavy burden because the cost of security has often outweighed its benefits.

Jayne Parkhouse Feb 1 2004 12:00AM Security
Review: WhatsUp Gold Failover

Review: WhatsUp Gold Failover

Monitoring networks can be tricky, whether it is connecting ten machines or ten thousand.

Dan Ilett Feb 1 2004 12:00AM Security
Review: eTrust Single Sign-On

Review: eTrust Single Sign-On

eTrust Single Sign-On is for the enterprise market and has three components – Policy Server, workstation client, and Policy Manager.

Geoff Marshall Feb 1 2004 12:00AM Security

Log In

  |  Forgot your password?