Latest News
CBA looks to AI for workforce planning
PsiQuantum to build computer at Moreton Bay
US to invest in IBM, other quantum computing firms
Singtel open to selling "meaningful minority stake" in Optus
Fears of unfettered hacking spurred by Anthropic's Mythos AI model likely 'overstated'
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
Cloud Covered
Security Breakfast
Executive Retreat
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
State of Security 2026
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
iTnews TV
PODCAST
EVENTS
Cloud Covered
Security Breakfast
Executive Retreat
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: SecurStar DriveCrypt Plus Pack
SecurStar's DriveCrypt Plus Pack Enterprise Edition 2.2 is a centrally managed server product used to disseminate whole disk encryption policies to client endpoint machines.
Nathan Ouellette
Oct 22 2008 4:26PM
Security
Review: Secuware Security Framework 4.0
Secuware Security Framework 4.0 is a directory service integrated product that contains a server and client software app used to manage whole disk or file/folder encryption policies.
Nathan Ouellette
Oct 22 2008 4:20PM
Security
How to manage employees in a time of change
Managing expectations and supporting employees during a period of organisational change can only enhance the ability to cope with the associated uncertainty.
Staff Writers
Oct 21 2008 4:12PM
Security
Review: First Look: The new Apple Macbook
Is Apple good at design? Usabilty? Both or neither? Also, where has all the Firewire gone? Alex Kidman has been testing Apple's new Macbook and gives his first impressions.
Alex Kidman
Oct 21 2008 10:52AM
Hardware
Review: WinMagic SecureDoc Enterprise 4.5
WinMagic SecureDoc Enteprise Edition 4.5 is a client server architecture that provides software-based full disk encryption to host client machines.
Nathan Ouellette
Oct 21 2008 10:31AM
Security
Review: EMC Documentum IRM
EMC Documentum IRM (Information Rights Management) brings complete document control and the ever-changing needs of users into one product.
Peter Stephenson,
Oct 17 2008 1:02PM
Security
Review: Utimaco SafeGuard Enterprise 5.3
Utimaco's SafeGuard Enterprise 5.3 is actually five components that roll into one product suite.
Nathan Ouellette
Oct 17 2008 12:29PM
Security
Effective Data Loss Prevention in an SSL World
Today, businesses are increasingly moving to SSL-encrypted traffic on their network for greater security and data protection.
Wayne Neich
Oct 17 2008 12:22PM
Security
Review: HTC Touch Pro unboxed
HTC's new Blackberry killer arrives on our desk, and it's every bit the showoff we thought it would be - and that's mean as a compliment.
William Maher
Oct 16 2008 3:39PM
Telco/ISP
Review: Palm Treo Pro, takes on the Blackberry Bold
The Treo Pro finally brings Palm's flagship smartphone into the modern age. It's available exclusively from Telstra on Next G, and unlike its cousin the Centro it comes with WiFi.
Adam Turner
Oct 16 2008 3:38PM
Telco/ISP
Forgetful mobile devices for careless users
“Blessed are the forgetful: for they shall have done with their stupidities too,” German philosopher Friedrich Nietzsche once wrote.
Liz Tay
Oct 16 2008 1:56PM
Security
Who has your data?
Businesses not only need to be focused on their intranets but they also need to be vigilant to their outsourced data flow.
Ian Castle
Oct 15 2008 3:35PM
Security
Review: CynapsPro Suite 2008
CynapsPro Suite 2008 is another tiered protection mechanism.
Justin Peltier
Oct 15 2008 3:32PM
Security
New tech, old threats
With flaws in many new products, vendors should listen a bit more to the research community perhaps
Ken Munro
Oct 14 2008 3:26PM
Security
Review: Safend Protector
Safend Protector is an offering that is less of a suite of products and more of a unified application.
Justin Peltier
Oct 14 2008 3:20PM
Security
Review: eEye Digital Security Blink Professional
Blink is an endpoint security product that functions as a network protector.
Justin Peltier
Oct 10 2008 10:59AM
Security
Review: GFi EndPointSecurity
EndPointSecurity installs a small footprint agent on the machine.
Justin Peltier
Oct 9 2008 3:46PM
Security
Avoiding the security pitfalls of cloud computing
Cloud computing has all the hallmarks of becoming a prevalent and valuable innovation that IT professionals should use to their advantage.
Steve Moyle
Oct 9 2008 3:27PM
Security
Case study: The Leading Edge calls Proofpoint to disable Botnet attack
Consultancy firm, The Leading Edge called Proofpoint to restore its email when a Botnet attack took the company’s internet link down.
Jenny Eagle
Oct 9 2008 3:13PM
Security
Interview: Brian NeSmith, CEO of Blue Coat Systems
The Blue Coat Systems CEO gazed into the dotcom abyss and survived. He thinks he has the measure of the downturn. Paul Fisher reports
Paul Fisher
Oct 9 2008 10:49AM
Security
Previous
Next
Most popular tech stories
Rio Tinto brings automation, Copilot to its finance function
AustralianSuper hires its first head of AI and automation
ABC drops Salesforce for Braze
CBA looks to AI for workforce planning
Chemist Warehouse's AI tool for HR becoming a "standard pattern"
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
'Touch-free' smartphone controlled with head movements
Photos: Australian industry explores data for net zero
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Govt launches consumer tech label program for smart devices
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?