Features

Review: ComputracePlus

Review: ComputracePlus

Having a laptop stolen can be stressful and demoralizing. But for many well-prepared, security conscious company executives it needn't be. ComputracePlus is an asset tracking software solution that can help to ease the problems associated with this type of loss, it can put control into the hands of the law enforcement officers that are assigned to your case and aid a swifter recovery. There is a high incidence of internal thefts reported with no way of catching the people responsible. But if employees also know that all equipment owned by their employers is easily traced through a solution such as ComputracePlus, many thefts might not occur.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: PC PhoneHome

Review: PC PhoneHome

PC PhoneHome differs from the other tracking solutions in that it does not require an annual subscription and is totally self sufficient, reporting not to a tracking center but to the laptop owner. This reduces the cost and ensures a user can pass information onto the law enforcement officer as quickly as it is received.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: zTrace Gold

Review: zTrace Gold

Even the most vigilant among us can still become victims of crime. But if the worst happens and a laptop is stolen, if it is protected and traceable then the stress involved should be much reduced.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: RSA SureFile

Review: RSA SureFile

RSA SureFile combines RSA's encryption technology alongside PKWARE's PKZIP to create an encryption product that also compresses files and folders to save space and bandwidth. Because encrypted files are generally fairly random looking, they are incompressible by hardware that may be part of a bandwidth-saving infrastructure. So, it is better to compress files before encryption, or optimize both processes within one product as RSA Security has done.

Geoff Marshall Nov 1 2003 12:00AM Security
Review: SecureDoc

Review: SecureDoc

SecureDoc is a disk encryption product that codes the entire hard disk, including operating system files and boot sector. Therefore it provides authentication of the user before the computer even boots up. It can also be used to encrypt all types of removable drives and media, including Flash cards. Although it can be installed in a password-only single-user environment, it provides an upgrade path to full enterprise-wide PKI and two- and three-factor authentication, integrating with third-party tokens.

Geoff Marshall Nov 1 2003 12:00AM Security
Review: AutoSafe

Review: AutoSafe

Transporting a laptop in a vehicle, it is often too easy to become careless and leave it in full view, inviting a smashed window, loss of expensive equipment and possibly months of work. There is no guarantee that thieves will not break into your car, so a mobile safe is a good investment.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: CompuClamp

Review: CompuClamp

It is not always practical or even necessary to take a laptop on a trip, so a little more steel is needed to be sure of its safety while it is unguarded. That is a job for CompuClamp. This aptly named solution provides a secure fixing for a laptop rendering it immobile. And it isn't a permanent feature; the clamp can be moved to any office desk, hotel room or wherever it is needed.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: MicroSaver Guaranteed

Review: MicroSaver Guaranteed

Cables for laptop security are a good visual deterrent to the opportunist thief, but tests have proven that, with just a little effort and a cutting implement, they are a removable feature.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: EasyLock

Review: EasyLock

The fact remains, like them or loathe them, security cables do serve a purpose, even if only as a deterrent. Of course, any determined thief will make light work of most cables if they are armed with stealth, surprise and a pair of bolt cutters but, without them, hardware is a target for the snatch-and-grab variety.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: Notebook Guardian ULTRA

Review: Notebook Guardian ULTRA

The tough Notebook Guardian certainly appears sturdy on initial visual contact - from lock to cable. It is made of steel with a strong looking keyed lock function, although PC Guardian does manufacture other locking choices such as the combination version illustrated. The cable is black vinyl coated and blends into the surroundings. We are still waiting for a manufacturer to use Day-Glo colors, which would certainly say "hands off."

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: 5.00GB 1.8-inch HDD

Review: 5.00GB 1.8-inch HDD

The ability to carry large amounts of data in your pocket could mean the end of the obligatory laptop haul. But as much as it can transform a daily commute without the worry of laptop theft, it can compound other problems.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: ABSPlus

Review: ABSPlus

ABSPlus is probably better know in the backup and recovery market and so it will be little surprise that what we are now looking at is exactly that - and more. It is an ideal storage unit to regularly back up all laptop data. With the software supplied the device becomes the complete backup and restore, disaster recovery solution.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: BioPico

Review: BioPico

Chrison takes security seriously with three specific portable devices available, all using different technology and design methodology. The BioPico, as its name suggests, is a 128MB biometric USB storage device, small enough to look unimpressive, but big enough to be used safely without being too small.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: Memory Stick PRO

Review: Memory Stick PRO

The smallest Group Test product was the MSX-256 Memory Stick PRO. It comes in a small, neat, case. The documentation was not very helpful and, had we not used this type of hardware before, we may have become stuck, because the case itself was not that easy to open. Apart from this minor setback Memory Stick compatible hardware is also required, whether using a laptop, PC, digital mobile phone or digital camera. That said, a PC card adapter or a USB reader/writer is all that is needed for laptop use and, given the protection that is afforded, it's a small price to pay.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: PicoDisk TECH 2

Review: PicoDisk TECH 2

As with the BioPico, PicoDisk TECH 2 requires no driver installation for Windows 2000, Me or XP and it is only when using Windows 98/SE or Mac operating systems that drivers must be installed from the CD provided.
The TECH 2 is a small USB token similar to the iKey design many people are familiar with and a USB extension cable for those hard to get at USB ports on many PCs.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: CyberGuard SL3200

Review: CyberGuard SL3200

As firewalls go, the CyberGuard SL3200 is a monster: a huge, noisy beast with performance that matches its rugged looks. The name denotes its capacity - 3.2 gigabits of total throughput, shared among a maximum of 26 Ethernet ports. Even more notably, it is able to multiplex several interfaces into a small number of very high-capacity pipes, all secured at wire speed.
Designed for high-demand environments, the box has all the HA features you'd expect - hot-swappable fans and power supplies, as well as RAID 5 storage, with an internal layout designed for maximum airflow and heat dissipation. Fail-over between two boxes is available if you have an extended license.

Jon Tullett Nov 1 2003 12:00AM Security
Review: QualysGuard Enterprise

Review: QualysGuard Enterprise

Qualys has provided an automated remote vulnerability testing service for some time. However, a remotely operated service like that is limited in what it can do when it is trying to access your computers through a properly configured firewall. That is not to say it doesn't do a good job of showing up external vulnerabilities, but it can't give a complete vulnerability picture, as it lacks the 'enemy within' perspective. Incidentally, internal risks are not limited to dishonest or malicious employees - it could apply to an innocent user accidentally running a trojan attached to an email, because he is running it inside the firewall perimeter.
What is needed to complete a security audit is a vulnerability assessment carried out from inside the organisation on the corporate intranet to see what vulnerabilities are exposed to internal users who may be a threat. And that's exactly what QualysGuard Enterprise does with its Intranet Scanner option.

Geoff Marshall Nov 1 2003 12:00AM Security
Review: iKey 3000

Review: iKey 3000

One-factor authentication (user IDs and password) is still the most widely used method, primarily because it is simple, easy and there are no pieces of hardware to configure. But there are many applications where this is just not secure enough. In two-factor authentication, not only do users need to know a PIN but they also need to possess the correct token. This higher level of security, combined with the token's memory and cryptographic processing capabilities, makes it particularly attractive as a solution for many situations such as digitally signing documents and mails and authenticating the user remotely for access to corporate networks through VPNs.

Paul Grosse Oct 1 2003 12:00AM Security
Review: Password Officer Deluxe

Review: Password Officer Deluxe

All your personal needs for sign-on can be secured and at the same time simplified by Password Officer Deluxe. This suite is essentially a repository for an individual's passwords so that he or she doesn't have to record them, but it also manages them in several important respects that make the sign-on process to any system, program, database, web site or other resource easier and safer.

Wilf Hey Oct 1 2003 12:00AM Security
Review: Configuresoft Enterprise - Configuration Manager

Review: Configuresoft Enterprise - Configuration Manager

Managing a network has never been easy, whether it comprises 100 or 100,000 machines. Even with a dedicated network administrator, the overheads are horrendous. Rolling out new applications, checking for non-licensed software, looking at network traffic... full-time tasks that often have no one with a full-time job to attend to them. This becomes even more worrying when you consider the security implications.

Craig Hinton Oct 1 2003 12:00AM Security

Log In

  |  Forgot your password?