Features

Review: StillSecure Safe Access

Review: StillSecure Safe Access

Safe Access from StillSecure offers a full network access control system that includes functionality for ensuring endpoints on the network meet policy and compliance standards before being able to join the network and access network resources.
Peter Stephenson Oct 4 2012 3:06PM Security
Review: Softerra Adaxes

Review: Softerra Adaxes

Adaxes from Softerra enables the ability to automate user provisioning and deprovisioning by interfacing directly with Microsoft Active Directory.
Peter Stephenson Oct 4 2012 3:03PM Security
Review: Quest One Identity Manager with ActiveRoles Server

Review: Quest One Identity Manager with ActiveRoles Server

Quest One Identity Manager with ActiveRoles Server provides a wide array of identity management features and functions.
Peter Stephenson Oct 4 2012 3:01PM Security
Review: NetWrix Identity Management Suite

Review: NetWrix Identity Management Suite

The NetWrix Identity Management Suite is actually a combination of several NetWrix products that are bundled together and can be installed individually or together as one large suite.
Staff Writer Oct 4 2012 2:58PM Security
Review: Lieberman Software Enterprise Random Password Manager

Review: Lieberman Software Enterprise Random Password Manager

Lieberman Software really delivered on this. Its Enterprise Random Password Manager (ERPM) addresses the management of privileged access across enterprise resources.
Peter Stephenson Oct 4 2012 2:42PM Security
Review: McAfee Cloud Identity Manager

Review: McAfee Cloud Identity Manager

The Cloud Identity Manager from McAfee helps administrators provide single sign-on and account provisioning for cloud-based applications.
Peter Stephenson Oct 4 2012 2:38PM Security
Review: NetIQ Identity Manager

Review: NetIQ Identity Manager

Identity Manager from NetIQ is a full identity and user management platform that allows administrators to manage users across physical, virtual and cloud-based environments.
Peter Stephenson Oct 4 2012 2:36PM Security
Review: Hitachi ID Systems Hitachi ID Management Suite v8.0

Review: Hitachi ID Systems Hitachi ID Management Suite v8.0

The Hitachi ID Management Suite is primarily made up of three modules: Hitachi ID Identity Manager, which helps manage identities and provisioning across multiple systems and applications; Hitachi ID Password Manager; and Hitachi ID Privileged Access Manager.
Peter Stephenson Oct 4 2012 2:33PM Security
Review: ForeScout Technologies ForeScout CounterACT v7.0

Review: ForeScout Technologies ForeScout CounterACT v7.0

ForeScout CounterACT offers an enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.
Peter Stephenson Oct 4 2012 2:29PM Security
Review: Fischer International Fischer Identity v5.0

Review: Fischer International Fischer Identity v5.0

The Fischer solution is postured to help organizations drive (not react to) their identity management solutions.
Peter Stephenson Oct 4 2012 2:25PM Security
Review: Code Green Networks CI-750 Content Inspection Appliance v8.0

Review: Code Green Networks CI-750 Content Inspection Appliance v8.0

The CI-750 provides real-time content inspection allowing customers to protect against data loss across the network.
Peter Stephenson Oct 4 2012 2:22PM Security
Review: Centrify Suite 2012

Review: Centrify Suite 2012

Centrify Suite 2012 provides user provisioning and access control across the enterprise.
Peter Stephenson Oct 4 2012 2:19PM Security
Review: Bradford Networks Network Sentry v6.0

Review: Bradford Networks Network Sentry v6.0

Network Sentry provides centrally managed access to the network, integrates with user management applications, such as Microsoft Active Directory, and may use agents or remain agentless.
Peter Stephenson Oct 4 2012 1:51PM Security
Review: Avatier Identity and Access Risk Management Suite v9.0

Review: Avatier Identity and Access Risk Management Suite v9.0

Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs.
Peter Stephenson Oct 4 2012 1:47PM Security
NAB takes IT off its books

NAB takes IT off its books

Interview: Looks to consume IT as-a-service.
Brett Winterford Oct 2 2012 9:30AM Strategy
Steve Wozniak weighs in on data centre future

Steve Wozniak weighs in on data centre future

Predicts RIM-like decline for spinning disk vendors.
Brett Winterford Sep 24 2012 3:30PM Hardware
Inside Linfox's vendor-first innovation strategy

Inside Linfox's vendor-first innovation strategy

Builds and extends wall-to-wall SAP house.
Liz Tay Sep 20 2012 12:30PM Strategy
Cutting cybercrime is a question of smart design

Cutting cybercrime is a question of smart design

Is it possible to 'design out' online crime?
Nigel Phair Sep 13 2012 12:06PM Security
Review: Samsung Galaxy Note 10.1

Review: Samsung Galaxy Note 10.1

Stylus-controlled tablet makes a comeback.
Chris Jager Sep 12 2012 10:00AM Hardware
Review: TeleSign Verify & PhoneID Standard

Review: TeleSign Verify & PhoneID Standard

The concept of using a mobile phone as an authentication device is not new.
Peter Stephenson Sep 7 2012 12:39PM Security

Log In

  |  Forgot your password?