Latest News
Concerns over Westpac Unite as tech chiefs depart
Wesfarmers to deploy agentic AI groupwide
Sydney Metro quietly abandoned M1 5G network hopes
Pentagon pushing AI companies to expand on classified networks
Fibre now the "dominant" tech in NBN Co's network mix
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Cloud Covered
Executive Retreat
BENCHMARK AWARDS
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Forgetful mobile devices for careless users
“Blessed are the forgetful: for they shall have done with their stupidities too,” German philosopher Friedrich Nietzsche once wrote.
Liz Tay
Oct 16 2008 1:56PM
Security
Who has your data?
Businesses not only need to be focused on their intranets but they also need to be vigilant to their outsourced data flow.
Ian Castle
Oct 15 2008 3:35PM
Security
Review: CynapsPro Suite 2008
CynapsPro Suite 2008 is another tiered protection mechanism.
Justin Peltier
Oct 15 2008 3:32PM
Security
New tech, old threats
With flaws in many new products, vendors should listen a bit more to the research community perhaps
Ken Munro
Oct 14 2008 3:26PM
Security
Review: Safend Protector
Safend Protector is an offering that is less of a suite of products and more of a unified application.
Justin Peltier
Oct 14 2008 3:20PM
Security
Review: eEye Digital Security Blink Professional
Blink is an endpoint security product that functions as a network protector.
Justin Peltier
Oct 10 2008 10:59AM
Security
Review: GFi EndPointSecurity
EndPointSecurity installs a small footprint agent on the machine.
Justin Peltier
Oct 9 2008 3:46PM
Security
Avoiding the security pitfalls of cloud computing
Cloud computing has all the hallmarks of becoming a prevalent and valuable innovation that IT professionals should use to their advantage.
Steve Moyle
Oct 9 2008 3:27PM
Security
Case study: The Leading Edge calls Proofpoint to disable Botnet attack
Consultancy firm, The Leading Edge called Proofpoint to restore its email when a Botnet attack took the company’s internet link down.
Jenny Eagle
Oct 9 2008 3:13PM
Security
Interview: Brian NeSmith, CEO of Blue Coat Systems
The Blue Coat Systems CEO gazed into the dotcom abyss and survived. He thinks he has the measure of the downturn. Paul Fisher reports
Paul Fisher
Oct 9 2008 10:49AM
Security
Review: GuardianEdge Device Control
GuardianEdge Device Control is a component of the more robust GuardianEdge Data Protection Platform.
Justin Peltier
Oct 8 2008 3:39PM
Security
Q & A: DLP for the rest of us
Richard Turner, CEO of Clearswift speaks about the security industry’s most hyped concepts: Data Loss Prevention (DLP).
Staff Writers
Oct 8 2008 2:41PM
Security
Review: ASUS M51Va, killer value Centrino 2 notebook
Despite some odd feature choices, this is an affordable powerhouse of a laptop. A great value mid-range Centrino 2 laptop, as long as you're not worried about battery life.
Zara Baxter
Oct 8 2008 2:37PM
Hardware
Review: Lumension SAC and SDC
Lumension offers a pair of products, Sanctuary Application Control and Sanctuary Device Control, that work in tandem to provide protection of devices.
Justin Peltier
Oct 7 2008 3:02PM
Security
Safe browsing with Google Chrome?
Security experts give mixed reviews about Google’s inaugural web browser, Chrome.
Negar Salek
Oct 3 2008 7:00AM
Security
Review: Novell ZENworks ESM
First, it is important to note that unlike previous versions of ZENworks, Novell ZENworks Endpoint Security Management (ESM) does not require anything else from Novell to operate.
Justin Peltier
Oct 3 2008 7:00AM
Security
Review: Linksys WRT610N, dual-n band networking is here
The arrival of dual-n band networking with 5GHz promises an end to crowded home wireless networks. Speed, range and technology is great, but the price is steep
Zara Baxter
Oct 1 2008 5:06PM
Networking
Review: SkyRecon StormShield
StormShield Security Suite offers integrated system and data protection in a single product.
Justin Peltier
Oct 1 2008 3:44PM
Security
Review: Panda Security Security for Enterprise
Panda Security for Enterprise is another suite of products designed to protect the endpoint.
Justin Peltier
Sep 30 2008 2:28PM
Security
Eugene Kaspersky on the cybercrime arms race
While it is unlikely we will ever abolish cybercrime, I do believe that we can make the internet a safer place.
Eugene Kaspersky
Sep 30 2008 11:25AM
Security
Previous
Next
Most popular tech stories
Wesfarmers to deploy agentic AI groupwide
Service NSW launches Digital ID pilot
AMP deploys over 400 AI agents across organisation
ABC drops Salesforce for Braze
ANZ deploys Agentforce to supercharge new CRM system
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?