Features

Lessons from the Sony hack

Lessons from the Sony hack

Software flaws are easy to attack, so, fix them.
Joe Basirico Jul 20 2011 4:07PM Security
Review: Optus wireless broadband

Review: Optus wireless broadband

Needs simpler and much better value plans.
Alex Kidman Jul 20 2011 11:11AM Telco/ISP
Review: Vodafone wireless broadband

Review: Vodafone wireless broadband

Competitive pricing, but poor network speeds and availability.
Alex Kidman Jul 18 2011 1:50PM Telco/ISP
Take AntiSec to the boardroom

Take AntiSec to the boardroom

CSOs need to get into the boardrooms and articulate the risk to the business.
Patricia Titus, CIO, UniSys Jul 13 2011 8:24AM Security
Analysis: Quantum crypto leaps

Analysis: Quantum crypto leaps

Big advances mean that quantum encryption may soon be ready to safeguard the most valuable assets of government and industry.
John Edwards Jul 13 2011 7:42AM Security
Federated Identity flourishing

Federated Identity flourishing

Standards are maturing just in time for identity federations to meet the new demands for cloud and mobile access.
Deb Radcliff Jul 12 2011 2:18PM Security
Review: Novell ZENworks Endpoint Security Management

Review: Novell ZENworks Endpoint Security Management

Integrates with ZENworks environments but it lacks anti-virus and DLP.
Nathan Ouellette Jul 12 2011 2:14PM Security
Review: Telstra wireless broadband

Review: Telstra wireless broadband

Still the fastest option out there, by a shrinking margin.
Alex Kidman Jul 11 2011 1:00PM Telco/ISP
Review: DeviceLock Endpoint DLP Suite

Review: DeviceLock Endpoint DLP Suite

Performs well with regard to restricting access and protecting data transfer to endpoint devices, but the MMC-based admin user interface isn’t flashy, but it works.
Nathan Ouellette Jul 7 2011 2:41PM Security
Review: Virgin wireless broadband

Review: Virgin wireless broadband

Solid data rates, and excellent per-Kb pricing.
Alex Kidman Jul 5 2011 3:57PM Telco/ISP
Review: Check Point Endpoint Security R80

Review: Check Point Endpoint Security R80

Comprehensive endpoint security features in a single agent, but backend administrative tasks are spread across multiple applications.
SC Australia Staff Jul 5 2011 1:50PM Security
Review: VividWireless wireless broadband

Review: VividWireless wireless broadband

Excellent plan prices but both speed and coverage could be improved.
Alex Kidman Jul 5 2011 5:23AM Telco/ISP
Review: Bit9 Parity Suite

Review: Bit9 Parity Suite

Great value for the amount of endpoint security features.
Nathan Ouellette Jul 4 2011 4:06PM Security
Seven sins of data recovery

Seven sins of data recovery

If you don’t like the answers your vendor gives you, move on.
Carlo Minassian, Founder & CEO, Earthwave Jul 4 2011 3:51PM Security
Review: McAfee Total Protection for Compliance

Review: McAfee Total Protection for Compliance

Usability, dashboard, reporting, application whitelisting and file integrity monitoring are decent, but it only integrates with McAfee Countermeasure products.
Michael Lipinski Jul 1 2011 2:27PM Security
Review: Three wireless broadband

Review: Three wireless broadband

Terrible speeds, small coverage area and poor plan value.
Alex Kidman Jul 1 2011 5:45AM Telco/ISP
Review: Skybox Risk Control & Network Assurance

Review: Skybox Risk Control & Network Assurance

It has good network mapping, risk correlation, audit logging, and an ability to understand IPS events, but it lacks in business risk support and compliance control.
Michael Lipinski Jun 30 2011 11:47AM Security
Review: Rsam

Review: Rsam

Purpose-built for GRC, smooth integration and mapping/translate features to group data, strong tool for alerting and automation.
Michael Lipinski Jun 29 2011 3:04PM Security
Review: Acer Iconia A500 tablet

Review: Acer Iconia A500 tablet

A fast, sleek Android 3.0 tablet with an array of connectivity options.
Nic Healey Jun 29 2011 12:45PM Hardware
Review: RedSeal Systems Network Advisor & Vulnerability Advisor

Review: RedSeal Systems Network Advisor & Vulnerability Advisor

Has strong integration, nice best practice and downstream impact capabilities. Very useful risk map with great visualisation for the security team, but it lacks incident management and some compliance down to control- level capabilities.
Michael Lipinski Jun 28 2011 4:44PM Security

Log In

  |  Forgot your password?