Latest News
Concerns over Westpac Unite as tech chiefs depart
Wesfarmers to deploy agentic AI groupwide
Sydney Metro quietly abandoned M1 5G network hopes
Pentagon pushing AI companies to expand on classified networks
Fibre now the "dominant" tech in NBN Co's network mix
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Enterprise key management deciphered
As encryption becomes more widely adopted, organisations are also experiencing an increasing concern about the management of a growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of encrypted information.
Steve Pate
Jan 23 2009 1:34PM
Security
Review: ESET Smart Security v3.0
It provides a good range of malware protection at the endpoint, and the administration console did a nice job reporting, alerting, distributing and managing the endpoint software.
Michael Lipinski
Jan 21 2009 2:54PM
Security
Malware epidemic demands a united front
Cybercriminals have readily exploited the Web2.0 revolution, meaning that a new approach is needed to fight them, says Blue Coat Australia's Wayne Neich.
Wayne Neich
Jan 20 2009 11:44AM
Security
In the vault
When it comes to protecting financial info, IT security professionals can never rest on their laurels, reports Jean Thilmany.
Jean Thilmany
Jan 16 2009 2:32PM
Security
Review: BitDefender Corporate Security
BitDefender Corporate Security is a security and management solution which delivered proactive protection from viruses, spyware, rootkits, spam, phishing and other forms of malware.
Michael Lipinski
Jan 16 2009 2:11PM
Security
How new access control technologies can address insider threats
Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich Campagna.
Rich Campagna
Jan 13 2009 5:09PM
Security
Review: AVG Technologies Internet Security Network
This product integrated most of the malware solutions while providing an efficient, streamlined user-friendly offering.
Michael Lipinski
Jan 13 2009 4:56PM
Security
Review: Lenovo IdeaPad S10
Well designed, solid and well-featured, but the battery
life sells it short.
Zara Baxter
Jan 13 2009 3:14PM
Hardware
Review: HP Mini 1001TU
Stylish, sophisticated and super-portable: this is the netbook you’ll have to hide from your friends.
Zara Baxter
Jan 13 2009 11:11AM
Hardware
Making a case to the board
Justifying security spend in tough times is a hard sell. So, avoid complex ROI arguments, focus on risk and steer clear of jargon, says Rob Buckley.
Rob Buckley
Jan 12 2009 4:52PM
Security
Unlocking encryption—A key to data security
Unitrends CEO Duncan McPherson looks at how encryption has become an increasingly important technology for businesses.
Duncan McPherson
Jan 8 2009 12:33PM
Security
Versatile authentication: The next logical step for the financial services sector
It may already be a cliché, but the credit crunch is forcing all types of businesses to review their costs and look at how they can reduce overheads.
Philip Hoyer, Technical architect, ActivIdentity EMEA
Jan 6 2009 2:45PM
Security
The five myths of two-factor authentication
Strong authentication has improved dramatically since its earliest days. And now more than ever, that comes as good news for consumers.
Kerry Loftus
Dec 16 2008 3:53PM
Security
Review: GTB Technologies Inspector
The GTB Inspector is an appliance which, while heavy, provides numerous features.
Justin Peltier
Dec 16 2008 3:49PM
Security
Review: Intelligent Wave CWAT
Like many products in this group review, the CWAT (Cybercrime, Warning, Alert, Termination) product takes a modular approach to data leakage prevention.
Justin Peltier
Dec 15 2008 3:22PM
Security
Review: NextLabs Enterprise DLP
NextLabs DLP is an interesting software-based offering.
Justin Peltier
Dec 11 2008 11:16AM
Security
At risk from grudge bearers?
The bitter reality of tough times can be made more sour by bad relations with the employees who can do real damage.
Ken Munro
Dec 10 2008 3:58PM
Security
Review: Lenovo IdeaPad S10 takes on Aspire One and Eee PC
A good netbook with lots of storage, but battery life keeps it from being great
Zara Baxter
Dec 10 2008 10:42AM
Hardware
Review: Symantec Vontu
The Symantec offering is the most complex product in this Group Test review
Justin Peltier
Dec 9 2008 3:27PM
Security
Interview: Phil Dunkelberger, CEO of PGP Corporation
The man at the helm of PGP Corporation talks to Paul Fisher about key choreography, strategy and saving Bletchley Park
Paul Fisher
Dec 5 2008 3:24PM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
Service NSW launches Digital ID pilot
AMP deploys over 400 AI agents across organisation
ABC drops Salesforce for Braze
ANZ deploys Agentforce to supercharge new CRM system
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?