Features

Review: SecureDoc

Review: SecureDoc

SecureDoc is a disk encryption product that codes the entire hard disk, including operating system files and boot sector. Therefore it provides authentication of the user before the computer even boots up. It can also be used to encrypt all types of removable drives and media, including Flash cards. Although it can be installed in a password-only single-user environment, it provides an upgrade path to full enterprise-wide PKI and two- and three-factor authentication, integrating with third-party tokens.

Geoff Marshall Nov 1 2003 12:00AM Security
Review: AutoSafe

Review: AutoSafe

Transporting a laptop in a vehicle, it is often too easy to become careless and leave it in full view, inviting a smashed window, loss of expensive equipment and possibly months of work. There is no guarantee that thieves will not break into your car, so a mobile safe is a good investment.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: CompuClamp

Review: CompuClamp

It is not always practical or even necessary to take a laptop on a trip, so a little more steel is needed to be sure of its safety while it is unguarded. That is a job for CompuClamp. This aptly named solution provides a secure fixing for a laptop rendering it immobile. And it isn't a permanent feature; the clamp can be moved to any office desk, hotel room or wherever it is needed.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: MicroSaver Guaranteed

Review: MicroSaver Guaranteed

Cables for laptop security are a good visual deterrent to the opportunist thief, but tests have proven that, with just a little effort and a cutting implement, they are a removable feature.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: EasyLock

Review: EasyLock

The fact remains, like them or loathe them, security cables do serve a purpose, even if only as a deterrent. Of course, any determined thief will make light work of most cables if they are armed with stealth, surprise and a pair of bolt cutters but, without them, hardware is a target for the snatch-and-grab variety.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: Notebook Guardian ULTRA

Review: Notebook Guardian ULTRA

The tough Notebook Guardian certainly appears sturdy on initial visual contact - from lock to cable. It is made of steel with a strong looking keyed lock function, although PC Guardian does manufacture other locking choices such as the combination version illustrated. The cable is black vinyl coated and blends into the surroundings. We are still waiting for a manufacturer to use Day-Glo colors, which would certainly say "hands off."

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: 5.00GB 1.8-inch HDD

Review: 5.00GB 1.8-inch HDD

The ability to carry large amounts of data in your pocket could mean the end of the obligatory laptop haul. But as much as it can transform a daily commute without the worry of laptop theft, it can compound other problems.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: ABSPlus

Review: ABSPlus

ABSPlus is probably better know in the backup and recovery market and so it will be little surprise that what we are now looking at is exactly that - and more. It is an ideal storage unit to regularly back up all laptop data. With the software supplied the device becomes the complete backup and restore, disaster recovery solution.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: BioPico

Review: BioPico

Chrison takes security seriously with three specific portable devices available, all using different technology and design methodology. The BioPico, as its name suggests, is a 128MB biometric USB storage device, small enough to look unimpressive, but big enough to be used safely without being too small.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: Memory Stick PRO

Review: Memory Stick PRO

The smallest Group Test product was the MSX-256 Memory Stick PRO. It comes in a small, neat, case. The documentation was not very helpful and, had we not used this type of hardware before, we may have become stuck, because the case itself was not that easy to open. Apart from this minor setback Memory Stick compatible hardware is also required, whether using a laptop, PC, digital mobile phone or digital camera. That said, a PC card adapter or a USB reader/writer is all that is needed for laptop use and, given the protection that is afforded, it's a small price to pay.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: PicoDisk TECH 2

Review: PicoDisk TECH 2

As with the BioPico, PicoDisk TECH 2 requires no driver installation for Windows 2000, Me or XP and it is only when using Windows 98/SE or Mac operating systems that drivers must be installed from the CD provided.
The TECH 2 is a small USB token similar to the iKey design many people are familiar with and a USB extension cable for those hard to get at USB ports on many PCs.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: PicoDisk Crypto

Review: PicoDisk Crypto

The thing about carrying data on a small plug-and-play device is that the majority of them are not secure. But, if it comes from the Chrison stable of products, you can be pretty sure it will be.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: ComputracePlus

Review: ComputracePlus

Having a laptop stolen can be stressful and demoralizing. But for many well-prepared, security conscious company executives it needn't be. ComputracePlus is an asset tracking software solution that can help to ease the problems associated with this type of loss, it can put control into the hands of the law enforcement officers that are assigned to your case and aid a swifter recovery. There is a high incidence of internal thefts reported with no way of catching the people responsible. But if employees also know that all equipment owned by their employers is easily traced through a solution such as ComputracePlus, many thefts might not occur.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: PC PhoneHome

Review: PC PhoneHome

PC PhoneHome differs from the other tracking solutions in that it does not require an annual subscription and is totally self sufficient, reporting not to a tracking center but to the laptop owner. This reduces the cost and ensures a user can pass information onto the law enforcement officer as quickly as it is received.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: zTrace Gold

Review: zTrace Gold

Even the most vigilant among us can still become victims of crime. But if the worst happens and a laptop is stolen, if it is protected and traceable then the stress involved should be much reduced.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: The CyberAngel Tracking Software

Review: The CyberAngel Tracking Software

With seven years behind it, Cyber Angel software has developed into a neat little package, which, apart from its tracking capabilities, also offers a CyberAngel Secured Drive. This requires password authentication but, once in, allows the user to keep all confidential data in total privacy in this protected drive. With on-the-fly encryption, the user does not need to worry about any data being revealed if the laptop falls into the wrong hands, using a choice of encryption algorithms to protect it such as Rijndael - AES 128 or 256 bit encryption, Blowfish 128 or 448 bit, Twofish 128 or 256 bit, Triple DES or DES. The virtual drive created by CyberAngel is accessed with the users password and is supported by 32-bit device drivers for fast access with little or no drop in performance.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: LapTrak

Review: LapTrak

Although it may not be possible to physically stop a theft from occurring, there are ways to track it if the worst happens.

Jayne Parkhouse Nov 1 2003 12:00AM Security
Review: CyberGuard SL3200

Review: CyberGuard SL3200

As firewalls go, the CyberGuard SL3200 is a monster: a huge, noisy beast with performance that matches its rugged looks. The name denotes its capacity - 3.2 gigabits of total throughput, shared among a maximum of 26 Ethernet ports. Even more notably, it is able to multiplex several interfaces into a small number of very high-capacity pipes, all secured at wire speed.
Designed for high-demand environments, the box has all the HA features you'd expect - hot-swappable fans and power supplies, as well as RAID 5 storage, with an internal layout designed for maximum airflow and heat dissipation. Fail-over between two boxes is available if you have an extended license.

Jon Tullett Nov 1 2003 12:00AM Security
Review: QualysGuard Enterprise

Review: QualysGuard Enterprise

Qualys has provided an automated remote vulnerability testing service for some time. However, a remotely operated service like that is limited in what it can do when it is trying to access your computers through a properly configured firewall. That is not to say it doesn't do a good job of showing up external vulnerabilities, but it can't give a complete vulnerability picture, as it lacks the 'enemy within' perspective. Incidentally, internal risks are not limited to dishonest or malicious employees - it could apply to an innocent user accidentally running a trojan attached to an email, because he is running it inside the firewall perimeter.
What is needed to complete a security audit is a vulnerability assessment carried out from inside the organisation on the corporate intranet to see what vulnerabilities are exposed to internal users who may be a threat. And that's exactly what QualysGuard Enterprise does with its Intranet Scanner option.

Geoff Marshall Nov 1 2003 12:00AM Security
Review: CyberAngel

Review: CyberAngel

CyberAngel is actually one of several competing packages on the market in the U.S. and Canada that allows a central monitoring station to detect when an unauthorized access to a PC or notebook has taken place, and alerts the owner accordingly.

Steve Gold Oct 1 2003 12:00AM Security

Log In

  |  Forgot your password?