Features

Review: Symark International PowerKeeper

Review: Symark International PowerKeeper

The Symark PowerKeeper is a hardened appliance. It comes with a sealed operating system that provides a secure privileged account access management process to replace the human approach to granting privileged access.
Peter Stephenson, Nov 10 2008 4:18PM Security
Review: Thycotic Software Secret Server

Review: Thycotic Software Secret Server

The Thycotic Secret Server integrates into the exiting environment to manage and control access to critical privileged passwords using a cen­tral web-based repository.
Peter Stephenson, Nov 10 2008 4:11PM Security
Making sense of PKI

Making sense of PKI

The Public Key Infrastructure solves many security problems, but also introduces risks that require careful management.
Nick Barron, Nov 10 2008 1:48PM Security
Review: Avoco Secure secure2Trust

Review: Avoco Secure secure2Trust

Avoco secure2trust provides many great features for document rights management across the enterprise.
Peter Stephenson, Nov 6 2008 2:46PM Security
Strategic firewall policy management

Strategic firewall policy management

Managing firewall rule sets and policies is a complex and messy business. Simply following a few best practices can go a long way to simplify your life, cut costs, and improve security.
Christophe Briguet chief technology officer, Exaprotect Nov 6 2008 2:37PM Security
Current levels of identity theft are inexcusable

Current levels of identity theft are inexcusable

Any IT chief worth their salt knows how to combat data theft, so why is it still so common, asks Ian Schenkel.
Ian Schenkel Nov 4 2008 12:10PM Security
Issues in electronic voting machine security

Issues in electronic voting machine security

A number of recent studies have highlighted the security concerns over e-voting machines.
Angela Moscsaritolo Oct 31 2008 2:03PM Security
Feature: How to cut energy costs at the node

Feature: How to cut energy costs at the node

Socket-level monitoring is this year’s hot button topic in power management. iTNews takes an in-depth look at how much power your servers are really drawing and the costs involved.
Ry Crozier Oct 30 2008 12:37PM Networking
Red Flags rules can help stop identity theft

Red Flags rules can help stop identity theft

Identity theft has become a multi-billion dollar issue that continues to accelerate, and protecting against it has become a multi-million dollar business, says Deloitte's Mark Steinhoff.
Mark Steinhoff, Deloitte Oct 29 2008 3:42PM Security
Review: EMC Documentum IRM

Review: EMC Documentum IRM

EMC Documentum IRM (Information Rights Man­agement) brings complete document control and the ever-changing needs of users into one product.
Peter Stephenson Oct 29 2008 3:32PM Security
Review: LockLizard Safeguard PDF Security

Review: LockLizard Safeguard PDF Security

LockLizard Safeguard PDF Security provides document rights management for PDF files.
Peter Stephenson, Oct 24 2008 11:57AM Security
Review: PGP Whole Disk Encryption 9.9

Review: PGP Whole Disk Encryption 9.9

PGP Whole Disk Encryp­tion is a client software application that provides whole disk encryption as part of PGP's suite of encryption prod­ucts.
Nathan Ouellette Oct 23 2008 4:06PM Security
Words will never hurt me?

Words will never hurt me?

Misuse of language is turning 'ordinary, decent computer criminals' into 'cyberterrorists' who menace world peace.
Nick Barron, Oct 22 2008 4:31PM Security
Review: SecurStar DriveCrypt Plus Pack

Review: SecurStar DriveCrypt Plus Pack

SecurStar's DriveCrypt Plus Pack Enterprise Edition 2.2 is a centrally managed server product used to disseminate whole disk encryption policies to client endpoint machines.
Nathan Ouellette Oct 22 2008 4:26PM Security
Review: Secuware Security Framework 4.0

Review: Secuware Security Framework 4.0

Secuware Security Frame­work 4.0 is a directory ser­vice integrated product that contains a server and client soft­ware app used to manage whole disk or file/folder encryption poli­cies.
Nathan Ouellette Oct 22 2008 4:20PM Security
How to manage employees in a time of change

How to manage employees in a time of change

Managing expectations and supporting employees during a period of organisational change can only enhance the ability to cope with the associated uncertainty.
Staff Writers Oct 21 2008 4:12PM Security
Review: First Look: The new Apple Macbook

Review: First Look: The new Apple Macbook

Is Apple good at design? Usabilty? Both or neither? Also, where has all the Firewire gone? Alex Kidman has been testing Apple's new Macbook and gives his first impressions.
Alex Kidman Oct 21 2008 10:52AM Hardware
Review: WinMagic SecureDoc Enterprise 4.5

Review: WinMagic SecureDoc Enterprise 4.5

WinMagic SecureDoc Enteprise Edition 4.5 is a client server architec­ture that provides software-based full disk encryption to host client machines.
Nathan Ouellette Oct 21 2008 10:31AM Security
Review: EMC Documentum IRM

Review: EMC Documentum IRM

EMC Documentum IRM (Information Rights Man­agement) brings complete document control and the ever-changing needs of users into one product.
Peter Stephenson, Oct 17 2008 1:02PM Security
Review: Utimaco SafeGuard Enterprise 5.3

Review: Utimaco SafeGuard Enterprise 5.3

Utimaco's SafeGuard Enterprise 5.3 is actually five components that roll into one product suite.
Nathan Ouellette Oct 17 2008 12:29PM Security

Log In

  |  Forgot your password?