Features

Review: Dell Precision Workstation M6400

Review: Dell Precision Workstation M6400

If you don’t care about weight, this is what a laptop should be
Zara Baxter Feb 2 2009 11:26PM Hardware
Waiting out the storm

Waiting out the storm

Peter Croft, managing director of Clearswift Asia-Pacific, says businesses should look at getting the most out of their existing IT security, as the global financial crisis forces inevitable cutbacks.
Peter Croft Jan 29 2009 11:39AM Security
Cyberwarfare: How secure are your communications?

Cyberwarfare: How secure are your communications?

Mike Simms, vice president of EADS Defence & Security Systems, looks at how carefully we handle information and data in the digital age.
Mike Simms Jan 28 2009 4:08PM Security
Enterprise key management deciphered

Enterprise key management deciphered

As encryption becomes more widely adopted, organisations are also experiencing an increasing concern about the management of a growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of encrypted information.
Steve Pate Jan 23 2009 1:34PM Security
Review: ESET Smart Security v3.0

Review: ESET Smart Security v3.0

It provides a good range of malware protection at the endpoint, and the administration console did a nice job reporting, alerting, distributing and managing the endpoint software.
Michael Lipinski Jan 21 2009 2:54PM Security
Malware epidemic demands a united front

Malware epidemic demands a united front

Cybercriminals have readily exploited the Web2.0 revolution, meaning that a new approach is needed to fight them, says Blue Coat Australia's Wayne Neich.
Wayne Neich Jan 20 2009 11:44AM Security
In the vault

In the vault

When it comes to protecting financial info, IT security professionals can never rest on their laurels, reports Jean Thilmany.
Jean Thilmany Jan 16 2009 2:32PM Security
Review: BitDefender Corporate Security

Review: BitDefender Corporate Security

BitDefender Corporate Security is a security and management solution which delivered proactive protection from viruses, spyware, rootkits, spam, phishing and other forms of malware.
Michael Lipinski Jan 16 2009 2:11PM Security
How new access control technologies can address insider threats

How new access control technologies can address insider threats

Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich Campagna.
Rich Campagna Jan 13 2009 5:09PM Security
Review: AVG Technologies Internet Security Network

Review: AVG Technologies Internet Security Network

This product integrated most of the malware solutions while providing an efficient, streamlined user-friendly offering.
Michael Lipinski Jan 13 2009 4:56PM Security
Review: Lenovo IdeaPad S10

Review: Lenovo IdeaPad S10

Well designed, solid and well-featured, but the battery
life sells it short.
Zara Baxter Jan 13 2009 3:14PM Hardware
Review: HP Mini 1001TU

Review: HP Mini 1001TU

Stylish, sophisticated and super-portable: this is the netbook you’ll have to hide from your friends.
Zara Baxter Jan 13 2009 11:11AM Hardware
Making a case to the board

Making a case to the board

Justifying security spend in tough times is a hard sell. So, avoid complex ROI arguments, focus on risk and steer clear of jargon, says Rob Buckley.
Rob Buckley Jan 12 2009 4:52PM Security
Unlocking encryption—A key to data security

Unlocking encryption—A key to data security

Unitrends CEO Duncan McPherson looks at how encryption has become an increasingly important technology for businesses.
Duncan McPherson Jan 8 2009 12:33PM Security
Versatile authentication: The next logical step for the financial services sector

Versatile authentication: The next logical step for the financial services sector

It may already be a cliché, but the credit crunch is forcing all types of businesses to review their costs and look at how they can reduce overheads.
Philip Hoyer, Technical architect, ActivIdentity EMEA Jan 6 2009 2:45PM Security
The five myths of two-factor authentication

The five myths of two-factor authentication

Strong authentication has improved dramatically since its earliest days. And now more than ever, that comes as good news for consumers.
Kerry Loftus Dec 16 2008 3:53PM Security
Review: GTB Technologies Inspector

Review: GTB Technologies Inspector

The GTB Inspector is an appliance which, while heavy, provides numerous features.
Justin Peltier Dec 16 2008 3:49PM Security
Review: Intelligent Wave CWAT

Review: Intelligent Wave CWAT

Like many products in this group review, the CWAT (Cybercrime, Warning, Alert, Termination) product takes a modular approach to data leakage prevention.
Justin Peltier Dec 15 2008 3:22PM Security
Review: NextLabs Enterprise DLP

Review: NextLabs Enterprise DLP

NextLabs DLP is an interesting software-based offering.
Justin Peltier Dec 11 2008 11:16AM Security
At risk from grudge bearers?

At risk from grudge bearers?

The bitter reality of tough times can be made more sour by bad relations with the employees who can do real damage.
Ken Munro Dec 10 2008 3:58PM Security

Log In

  |  Forgot your password?