Features

Review: Palm Treo Pro, takes on the Blackberry Bold

Review: Palm Treo Pro, takes on the Blackberry Bold

The Treo Pro finally brings Palm's flagship smartphone into the modern age. It's available exclusively from Telstra on Next G, and unlike its cousin the Centro it comes with WiFi.
Adam Turner Oct 16 2008 3:38PM Telco/ISP
Forgetful mobile devices for careless users

Forgetful mobile devices for careless users

“Blessed are the forgetful: for they shall have done with their stupidities too,” German philosopher Friedrich Nietzsche once wrote.
Liz Tay Oct 16 2008 1:56PM Security
Who has your data?

Who has your data?

Businesses not only need to be focused on their intranets but they also need to be vigilant to their outsourced data flow.
Ian Castle Oct 15 2008 3:35PM Security
Review: CynapsPro Suite 2008

Review: CynapsPro Suite 2008

CynapsPro Suite 2008 is another tiered protection mechanism.
Justin Peltier Oct 15 2008 3:32PM Security
New tech, old threats

New tech, old threats

With flaws in many new products, vendors should listen a bit more to the research community perhaps
Ken Munro Oct 14 2008 3:26PM Security
Review: Safend Protector

Review: Safend Protector

Safend Protector is an offering that is less of a suite of products and more of a unified application.
Justin Peltier Oct 14 2008 3:20PM Security
Review: eEye Digital Security Blink Professional

Review: eEye Digital Security Blink Professional

Blink is an endpoint security product that functions as a network protector.
Justin Peltier Oct 10 2008 10:59AM Security
Review: GFi EndPointSecurity

Review: GFi EndPointSecurity

EndPointSecurity installs a small footprint agent on the machine.
Justin Peltier Oct 9 2008 3:46PM Security
Avoiding the security pitfalls of cloud computing

Avoiding the security pitfalls of cloud computing

Cloud computing has all the hallmarks of becoming a prevalent and valuable innovation that IT professionals should use to their advantage.
Steve Moyle Oct 9 2008 3:27PM Security
Case study: The Leading Edge calls Proofpoint to disable Botnet attack

Case study: The Leading Edge calls Proofpoint to disable Botnet attack

Consultancy firm, The Leading Edge called Proofpoint to restore its email when a Botnet attack took the company’s internet link down.
Jenny Eagle Oct 9 2008 3:13PM Security
Interview: Brian NeSmith, CEO of Blue Coat Systems

Interview: Brian NeSmith, CEO of Blue Coat Systems

The Blue Coat Systems CEO gazed into the dotcom abyss and survived. He thinks he has the measure of the downturn. Paul Fisher reports
Paul Fisher Oct 9 2008 10:49AM Security
Review: GuardianEdge Device Control

Review: GuardianEdge Device Control

GuardianEdge Device Control is a component of the more robust GuardianEdge Data Protection Platform.
Justin Peltier Oct 8 2008 3:39PM Security
Q & A: DLP for the rest of us

Q & A: DLP for the rest of us

Richard Turner, CEO of Clearswift speaks about the security industry’s most hyped concepts: Data Loss Prevention (DLP).
Staff Writers Oct 8 2008 2:41PM Security
Review: ASUS M51Va, killer value Centrino 2 notebook

Review: ASUS M51Va, killer value Centrino 2 notebook

Despite some odd feature choices, this is an affordable powerhouse of a laptop. A great value mid-range Centrino 2 laptop, as long as you're not worried about battery life.
Zara Baxter Oct 8 2008 2:37PM Hardware
Review: Lumension SAC and SDC

Review: Lumension SAC and SDC

Lumension offers a pair of products, Sanctuary Application Control and Sanctuary Device Control, that work in tandem to provide protection of devices.
Justin Peltier Oct 7 2008 3:02PM Security
Review: Novell ZENworks ESM

Review: Novell ZENworks ESM

First, it is important to note that unlike previous versions of ZENworks, Novell ZENworks Endpoint Security Management (ESM) does not require anything else from Novell to operate.

Justin Peltier Oct 3 2008 7:00AM Security
Safe browsing with Google Chrome?

Safe browsing with Google Chrome?

Security experts give mixed reviews about Google’s inaugural web browser, Chrome.
Negar Salek Oct 3 2008 7:00AM Security
Review: Linksys WRT610N, dual-n band networking is here

Review: Linksys WRT610N, dual-n band networking is here

The arrival of dual-n band networking with 5GHz promises an end to crowded home wireless networks. Speed, range and technology is great, but the price is steep
Zara Baxter Oct 1 2008 5:06PM Networking
Review: SkyRecon StormShield

Review: SkyRecon StormShield

StormShield Security Suite offers integrated system and data protection in a single product.
Justin Peltier Oct 1 2008 3:44PM Security
Review: Panda Security Security for Enterprise

Review: Panda Security Security for Enterprise

Panda Security for Enterprise is another suite of products designed to protect the endpoint.
Justin Peltier Sep 30 2008 2:28PM Security

Log In

  |  Forgot your password?