Features

Get prepared to avoid downtime

Get prepared to avoid downtime

Fires, power outages, cyberattacks. Natural and man-made disasters threaten every company, but in this increasingly internet-dependent economy, downtime and the losses caused by it are a major concern.
Marcia Savage Feb 12 2004 6:39PM Security
Cybersecurity’s new power surge

Cybersecurity’s new power surge

Before he left his post as White House cyberspace security advisor last May, Howard Schmidt promised top federal officials that he would create a greater leadership role in the private sector on cybersecurity.
Marcia Savage Feb 12 2004 6:27PM Security
Only authorized users welcome

Only authorized users welcome

With internal attacks on systems becoming ever more frequent, and the necessity for data accuracy increasing under corporate compliance legislation, I decided it was time to examine whether centralized user provisioning could secure information cost-effectively.
Neil Chaney Feb 12 2004 6:17PM Security
This government can’t keep pointing fingers

This government can’t keep pointing fingers

The Department of Homeland Security (DHS) was one of eight federal agencies that scored an F on the most recent Federal Computer Security report card. That's scary and funny all at once.
Illena Armstrong Feb 12 2004 5:54PM Security
Trustworthy Computing must include browsers

Trustworthy Computing must include browsers

What is Microsoft thinking of? The company’s laudable goals of Trustworthy Computing have seen great strides made in much of its software, its patching process is improving and security-specific products like ISA Server are getting steadily better. But the firm seems to be having huge difficulty fixing fundamental flaws in Internet Explorer, flaws that are being actively exploited by criminals, and is now considering abandoning standards in what appear to be increasingly desperate attempts to secure the browser.
Jon Tullett Feb 12 2004 5:42PM Security
Review: Secure Access Manager

Review: Secure Access Manager

This product provides users with SSO and administrators with a centralized way of managing the applications and resources that a user can access. It uses a centralized Policy Server and security plug-ins on user workstations and it authenticates users at first login with a choice, or combination, of password, Radius, token, certificate, smartcard or biometric authentication methods.

Geoff Marshall Feb 12 2004 12:00AM Security
Companies combine to face biometric challenge

Companies combine to face biometric challenge

Security firms De La Rue Identity Systems and BioDentity Systems have teamed up to provide international travel document and border clearance solutions that work using biometrics.
Dan Ilett Feb 9 2004 4:51PM Security
Review: ActivCard Gold Desktop

Review: ActivCard Gold Desktop

ActivCard knows how to provide products for review – they sent us software kits for Windows, Mac, Linux and Solaris, complete with manuals and supporting literature.

This was complemented by three smartcard readers, a PCMCIA reader, USB tokens and smartcards.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: ActivPack AAA Server

Review: ActivPack AAA Server

This is a comprehensive and flexible product upon which may be built an equally comprehensive access security model. It is scalable and facilitates the management of both local and remote network access within various environments and, if required, across multiple authentication servers.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Safe@Office

Review: Safe@Office

For anyone connecting to the internet, security has long been an issue. However, for many small businesses, the cost of security has also been a big issue and a heavy burden because the cost of security has often outweighed its benefits.

Jayne Parkhouse Feb 1 2004 12:00AM Security
Review: WhatsUp Gold Failover

Review: WhatsUp Gold Failover

Monitoring networks can be tricky, whether it is connecting ten machines or ten thousand.

Dan Ilett Feb 1 2004 12:00AM Security
Review: Trinity Secure Sign-On

Review: Trinity Secure Sign-On

Trinity is designed to allow enterprises to protect sign-on with smartcards, fingerprint biometrics, hardware tokens, passwords, or a combination of these methods.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: BinTec X2300

Review: BinTec X2300

While just about every company has a connection to the internet in one form or another, not everyone has a failover option to go back to dial-up or ISDN. Fewer still have VPN or indeed a proper firewall to ensure the lines of communication are secure.

René Millman Feb 1 2004 12:00AM Security
Review: Vintela Authentication from SCO

Review: Vintela Authentication from SCO

Not strictly a single sign-on (SSO) product,Vintela Authentication is designed to provide a more cost-effective solution than SSOs to the problem of users having different login credentials to Windows and UNIX resources.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Corporate Server

Review: Corporate Server

SmoothWall Corporate Server enables non-technical users to build a dedicated firewall to connect a network of computers to the internet. This software solution is designed to be cost-effective, because almost any Pentium-class PC can be used as the dedicated hardware platform. This firewall has been developed to meet the internet security needs of small to medium-sized organizations, corporate branch offices, and individuals with demanding security needs.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: eTrust Single Sign-On

Review: eTrust Single Sign-On

eTrust Single Sign-On is for the enterprise market and has three components – Policy Server, workstation client, and Policy Manager.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Novell Nsure SecureLogin

Review: Novell Nsure SecureLogin

SecureLogin provides SSO across all the applications that a corporation might be running – mainframe, web-based, Windows 32-bit and UNIX. It also works with terminal emulators and in Citrix environments, and integrates with two-factor authentication systems based on smartcards, tokens or biometrics.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: iKey 1000

Review: iKey 1000

The iKey product from Rainbow Technologies comes in a variety of ways, according to your individual requirements. The iKey 1000 tested is a straightforward two-factor authentication product featuring a USB token and PIN.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: iKey 2000

Review: iKey 2000

The iKey 2000 product from Rainbow Technologies is similar in concept to the iKey 1000, but it offers additional functionality, including 2048-bit encryption and a Philips 5032 cryptographic controller.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: KeyCrypt

Review: KeyCrypt

The DigiSafe USB token seems just like any other at first glance, but it gradually reveals itself to be an exceptionally interesting device.

Julian Ashbourn Feb 1 2004 12:00AM Security

Log In

  |  Forgot your password?