Features

Unlocking encryption—A key to data security

Unlocking encryption—A key to data security

Unitrends CEO Duncan McPherson looks at how encryption has become an increasingly important technology for businesses.
Duncan McPherson Jan 8 2009 12:33PM Security
Versatile authentication: The next logical step for the financial services sector

Versatile authentication: The next logical step for the financial services sector

It may already be a cliché, but the credit crunch is forcing all types of businesses to review their costs and look at how they can reduce overheads.
Philip Hoyer, Technical architect, ActivIdentity EMEA Jan 6 2009 2:45PM Security
The five myths of two-factor authentication

The five myths of two-factor authentication

Strong authentication has improved dramatically since its earliest days. And now more than ever, that comes as good news for consumers.
Kerry Loftus Dec 16 2008 3:53PM Security
Review: GTB Technologies Inspector

Review: GTB Technologies Inspector

The GTB Inspector is an appliance which, while heavy, provides numerous features.
Justin Peltier Dec 16 2008 3:49PM Security
Review: Intelligent Wave CWAT

Review: Intelligent Wave CWAT

Like many products in this group review, the CWAT (Cybercrime, Warning, Alert, Termination) product takes a modular approach to data leakage prevention.
Justin Peltier Dec 15 2008 3:22PM Security
Review: NextLabs Enterprise DLP

Review: NextLabs Enterprise DLP

NextLabs DLP is an interesting software-based offering.
Justin Peltier Dec 11 2008 11:16AM Security
At risk from grudge bearers?

At risk from grudge bearers?

The bitter reality of tough times can be made more sour by bad relations with the employees who can do real damage.
Ken Munro Dec 10 2008 3:58PM Security
Review: Lenovo IdeaPad S10 takes on Aspire One and Eee PC

Review: Lenovo IdeaPad S10 takes on Aspire One and Eee PC

A good netbook with lots of storage, but battery life keeps it from being great
Zara Baxter Dec 10 2008 10:42AM Hardware
Review: Symantec Vontu

Review: Symantec Vontu

The Symantec offering is the most complex product in this Group Test review
Justin Peltier Dec 9 2008 3:27PM Security
Interview: Phil Dunkelberger, CEO of PGP Corporation

Interview: Phil Dunkelberger, CEO of PGP Corporation

The man at the helm of PGP Corporation talks to Paul Fisher about key choreography, strategy and saving Bletchley Park
Paul Fisher Dec 5 2008 3:24PM Security
Review: Trend Micro LeakProof

Review: Trend Micro LeakProof

Trend Micro LeakProof is an all-in-one appliance that comes with everything preloaded. All the admin needs to do is configure the device.
Justin Peltier Dec 5 2008 3:18PM Security
Review: Kogan Agora - a simpler, practical Google phone?

Review: Kogan Agora - a simpler, practical Google phone?

The next Google phone will be Kogan's Agora and it's looking to be much more understated, but perhaps sensible, design than the flashier T-Mobile G1.
Alex Kidman , William Maher Dec 5 2008 2:06PM Telco/ISP
Review: First Look: Blackberry Storm compared with iPhone 3G

Review: First Look: Blackberry Storm compared with iPhone 3G

Vodafone's grabbed itself an exclusive on the Blackberry Storm, but is it an exclusive that was worth it? We've unpacked a Blackberry Storm and given it a quick spin, and comparison with the iPhone 3G - here's our initial impressions.
Alex Kidman Dec 4 2008 10:33AM Telco/ISP
No fear factor: How to make role management work for the enterprise

No fear factor: How to make role management work for the enterprise

There are three key objectives to keep in mind for determining the success of any roles-based access and identity management initiative, says Deepak Taneja.
Deepak Taneja Dec 3 2008 2:48PM Security
Review: AdventNet ManageEngine

Review: AdventNet ManageEngine

The AdventNet Manage-Engine Password Manager Pro provides a complete system for password management in one simple web-based package.
Peter Stephenson Dec 3 2008 2:43PM Security
Enterprise single sign-on: It's simple economics

Enterprise single sign-on: It's simple economics

As enterprises have become more complex, there has been a corresponding rise in the identities associated with any one individual, said Jackson Shaw, Quest Software.
Jackson Shaw, Quest Software. Nov 28 2008 3:49PM Security
Feature: In the fine print

Feature: In the fine print

Cloud Computing’s side effects may include no-win SLAs and data access on someone else’s terms.
Ry Crozier Nov 28 2008 2:30PM Networking
Review: Cyber-Ark Software Enterprise Password Vault

Review: Cyber-Ark Software Enterprise Password Vault

The Cyber-Ark Enterprise Password Vault, or EPV, is a high-end password management powerhouse.
Peter Stephenson, Nov 26 2008 3:32PM Security
Protecting customer information

Protecting customer information

Enterprises still seem to have turned a blind eye to the vulnerability that exists when information, in document and spreadsheet form, leaves the company via email and laptops.
Brian Dirking, principal product director, Oracle Nov 25 2008 4:30PM Security
Review: Hitachi ID Systems ID-Archive

Review: Hitachi ID Systems ID-Archive

The Hitachi ID-Archive sets its focus on password randomisation.
Peter Stephenson, Nov 25 2008 4:25PM Security

Log In

  |  Forgot your password?