Features

Review:  SecureAuth IdP

Review: SecureAuth IdP

SecureAuth IdP combines a multitude of authentication and identity management features. It can be installed as an on-premise or cloud-based deployment for managing single sign-on and two-factor authentication for many facets of the enterprise infrastructure.
Peter Stephenson Apr 23 2013 2:12PM Security
Review: Swivel Appliance

Review: Swivel Appliance

The Swivel Appliance from Swivel Secure is driven by PINsafe technology that allows users to combine PINs with randomly generated security strings to provide robust strong authentication.
Peter Stephenson Apr 23 2013 1:57PM Security
Review: Digipass Go 7 and Identikey Authentication Server

Review: Digipass Go 7 and Identikey Authentication Server

Vasco pairs together its Digipass Go 7 and Identikey Authentication Server to provide solid out-of-the-box strong authentication to many applications throughout the enterprise environment. It can easily integrate with existing authentication stores in the enterprise to provide seamless two-factor authentication to web-based and cloud-based applications. It can also add two-factor authentication to VPN and Radius deployments providing an excellent amount of flexibility in integration.
Peter Stephenson Apr 23 2013 1:54PM Security
Review:  TeleSign 2FA

Review: TeleSign 2FA

TeleSign 2FA is a full API and SDK that allows an enterprise to integrate two-factor authentication into its existing web applications. It allows administrators to modify their existing web applications to include a drop-down box on the authentication screen from which a user can choose the way of receiving their one-time passcode. Passcodes can be sent to the user either via SMS text message or by phone to a number that has been previously registered. This provides full out-of-band two-factor authentication without the need to purchase additional tokens.
Peter Stephenson Apr 23 2013 1:51PM Security
Review: Big-IP Application Security Manager

Review: Big-IP Application Security Manager

Although primarily known for top-shelf networking products, F5 Networks' offering in the application security space is no afterthought. Available as a standalone appliance or module for one of its network products, the BIG-IP Application Security Manager (ASM) functions as a firewall, protecting web applications and services with a powerful policy engine.
Peter Stephenson Apr 23 2013 12:25PM Security
Review:  ForeScout CounterAct v7.0

Review: ForeScout CounterAct v7.0

ForeScout CounterAct offers enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response. The system provides a multifactored approach to identify and classifies all devices, systems, applications and users, assesses adherence to configuration and security policy, and determines if access to resources should be allowed, denied or limited.
Peter Stephenson Apr 23 2013 12:21PM Security
Review:  SecureSphere Business Security Suite

Review: SecureSphere Business Security Suite

With large enterprise networks under constant attack from malicious entities, administrators need powerful defences. Imperva makes its appearance in this field to help hold attackers at bay. Just prepare your chequebook - this product doesn't come cheap.
Peter Stephenson Apr 23 2013 12:18PM Security
Review:  Trend Micro InterScan Messaging Security

Review: Trend Micro InterScan Messaging Security

On paper, InterScan Messaging Security from Trend Micro is a wonderful product. Combining on-premise software with an optional cloud-based pre-filter, the tool provides a flexible approach to email security. If we would have been able to get it working, we would probably be impressed.
Peter Stephenson Apr 23 2013 12:14PM Security
Bankwest automates test and dev provisioning

Bankwest automates test and dev provisioning

Adopts CommBank tool in push towards continuous delivery.
Liz Tay Apr 2 2013 5:13PM Software
AT&T 'hacker' punished by myopic legal system

AT&T 'hacker' punished by myopic legal system

Opinion: Time doesn't fit the crime.
Darren Pauli Mar 20 2013 4:05PM Security
Citi Australia drops platform customisations

Citi Australia drops platform customisations

To standardise on regional core platform.
Liz Tay Mar 6 2013 3:34PM Strategy
Domino's Pizza survives the dial-a-hacks

Domino's Pizza survives the dial-a-hacks

How the pizza chain used the cloud to fend off hackers.
Allie Coyne Mar 4 2013 7:02AM Networking
NBN Co pilfers from iiNet's technical ranks

NBN Co pilfers from iiNet's technical ranks

Perth ISP competes for talent with mines, NBN Co and outsourcers.
Ry Crozier Mar 1 2013 7:17AM Telco/ISP
Aussie CIOs unconcerned by title, reporting lines

Aussie CIOs unconcerned by title, reporting lines

Distraction to the real job.
Ry Crozier Mar 1 2013 7:13AM Strategy
Zurich Australia establishes Malaysian IT team

Zurich Australia establishes Malaysian IT team

Extends team at reduced cost.
Liz Tay Feb 28 2013 1:57PM Strategy
"Fearless" CIOs get the funding

"Fearless" CIOs get the funding

Why Australia's tech leaders need to back themselves.
Brett Winterford Feb 28 2013 6:55AM Strategy
Public service "lacks appetite for shared services"

Public service "lacks appetite for shared services"

Could the election year be an impetus for more sharing?
Charis Palmer Feb 27 2013 4:37PM Strategy
Perpetual completes Fujitsu services shift

Perpetual completes Fujitsu services shift

Data centre to move this financial year.
Liz Tay Feb 22 2013 7:58AM Strategy
Eugene Kaspersky and Howard Schmidt interview

Eugene Kaspersky and Howard Schmidt interview

Eugene Kaspersky and Howard Schmidt talk security.
SC Australia Staff Feb 8 2013 5:46PM Security
Trusted Platform Module woes

Trusted Platform Module woes

Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.
Deb Radcliff Feb 5 2013 10:19AM Security

Log In

  |  Forgot your password?