Features

Review: Novell Netware 6.5

Review: Novell Netware 6.5

You might find it strange to see Novell Netware (essentially a network operating system) included in a group test of two-factor authentication products. But we are discussing secure access to information and services from both local and remote access points. We are also discussing effectively managing user profiles and administering security policies accordingly.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Passholder Pro

Review: Passholder Pro

This USB token offers two-factor authentication that has been considered from many perspectives, including that of the user.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: U.are.U Pro for Active Directory

Review: U.are.U Pro for Active Directory

We've reviewed this product before, (albeit a slightly earlier software revision), but make no apologies for including it as a solid two-factor authentication solution.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: AssureAccess

Review: AssureAccess

AssureAccess is access management software that provides application security for J2EE/Javabased web, portal and web services applications as well as securing traditional web servers.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Cams

Review: Cams

Cams is designed to control access to web and J2EE application server resources. Resources protected by Cams can reside on the corporate intranet, an extranet, or the internet, and they can be a document, a web application, or almost any other application, data, or even a device.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Citrix MetaFrame Password Manager

Review: Citrix MetaFrame Password Manager

Citrix MetaFrame Password Manager provides SSO to applications running in a Citrix MetaFrame Access Suite environment and non-Citrix environments.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Entrust GetAccess

Review: Entrust GetAccess

Entrust GetAccess is a web access control solution that provides web portal security and identity management. It supports a variety of authentication methods including passwords, certificates, tokens and biometrics. It provides flexibility for the rules enforced for user passwords as well as maintaining password histories.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: eToken Enterprise

Review: eToken Enterprise

eToken Enterprise provides a more cost-effective solution than SSOs to the problem of users having a different login credentials to Windows networks and the web based resources they use.

Geoff Marshall Feb 1 2004 12:00AM Security
Review: Digipass

Review: Digipass

The Digipass pack product from Vasco is perhaps less of a product in the accepted sense and more of a security philosophy – the philosophy in question being that of dynamic, one-time password creation using portable tokens.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: ECHOsystem

Review: ECHOsystem

The ECHOsystem from Fizians Inc. is certainly different. It uses audio to transmit the equivalent of a dynamic password across the network for user authentication purposes.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: Entrust USB Token

Review: Entrust USB Token

Entrust is known for its expertise in managing and securing digital identities, and the Entrust USB token is a two-factor authentication product worthy of the company's reputation. The token is based upon the Rainbow Technologies iKey 2032 device, a proven product.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: ActivCard Gold Desktop

Review: ActivCard Gold Desktop

ActivCard knows how to provide products for review – they sent us software kits for Windows, Mac, Linux and Solaris, complete with manuals and supporting literature.

This was complemented by three smartcard readers, a PCMCIA reader, USB tokens and smartcards.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: ActivPack AAA Server

Review: ActivPack AAA Server

This is a comprehensive and flexible product upon which may be built an equally comprehensive access security model. It is scalable and facilitates the management of both local and remote network access within various environments and, if required, across multiple authentication servers.

Julian Ashbourn Feb 1 2004 12:00AM Security
Review: RSA ACE/Server

Review: RSA ACE/Server

To many employees, the RSA SecurID tokens are a familiar sight, as is the procedure for logging in to a TCP/IP network using a onetime dynamic password technique embodied by this approach.

Julian Ashbourn Feb 1 2004 12:00AM Security
Prepare for more threats on Valentine’s Day

Prepare for more threats on Valentine’s Day

Akonix Systems, an enterprise security solutions provider, is warning companies to be on guard for additional infosec threats come Valentine’s Day.
Illena Armstrong Jan 28 2004 9:50PM Security
Top 10 list of web application vulnerabilities released

Top 10 list of web application vulnerabilities released

Companies wanting to better secure their web applications and services can start the process by reviewing the newly released Top 10 list of critical web application security problems recently disseminated by the Open Web Application Security Project (OWASP).
Illena Armstrong Jan 28 2004 9:48PM Security
PKWare expands reach of SecureZIP

PKWare expands reach of SecureZIP

PKWARE announced this week [jan.21] that it launched a series of initiatives to expand the availability of the its SecureZIP technology and PKZIP Reader product.
Marcia Savage Jan 24 2004 1:44AM Security
TruSecure product nixes vulnerabilities based on company assets

TruSecure product nixes vulnerabilities based on company assets

{Announcement hits Monday}TruSecure Corporation has released a product to help security administrators quickly understand intelligence data from their disparate security solutions and take action where necessary.
Illena Armstrong Jan 23 2004 3:04PM Security
More sophisticated email fraud emerges

More sophisticated email fraud emerges

Anti-spam company MailFrontier is warning companies that a new phishing technique has surfaced.
Illena Armstrong Jan 23 2004 2:46PM Security
Preparing for battle

Preparing for battle

Know your enemy: That’s the thrust of a new book just released through O’Reilly by infosec gurus Cyrus Peikari and Anton Chuvakin.
Illena Armstrong Jan 23 2004 2:45PM Security

Log In

  |  Forgot your password?