Features

Crypto chip: How the TPM bolsters enterprise security

Crypto chip: How the TPM bolsters enterprise security

Want to make your endpoints and servers more secure, and easier to manage?
Brian Berger, Wave Systems Corp Jun 30 2008 3:04PM Security
Review: PGP Universal Gateway Email 2.8

Review: PGP Universal Gateway Email 2.8

PGP Universal Gateway Email is a soft appliance email security solution offered as an integrated part of the PGP Encryption Platform.
Nathan Ouellette Jun 27 2008 3:03PM Security
Governance can be a channel play too

Governance can be a channel play too

Martin Atherton explains why a mismatch between information management capabilities and needs offers a golden opportunity.
Martin Atherton Jun 26 2008 3:51PM Security
Review: Red Earth Software Policy Patrol Enterprise

Review: Red Earth Software Policy Patrol Enterprise

Red Earth Policy Patrol Enterprise is a feature rich product that can be installed directly onto the mail server.
Peter Stephenson, Jun 26 2008 3:25PM Security
Building a security culture

Building a security culture

Lately there has been a lot of discussion about the difference between real security and compliance with data security regulations.
Gordon Rapkin, president and CEO, Protegrity Jun 25 2008 3:30PM Security
Review: SECNAP SpammerTrap

Review: SECNAP SpammerTrap

The SECNAP SpammerTrap is just what the name suggests. This product is a dedicated spam detection and protection tool.
Peter Stephenson, Jun 25 2008 3:10PM Security
iPhone vs. Blackberry: Who will rule in business?

iPhone vs. Blackberry: Who will rule in business?

With the new 3G iPhone making its way to Aussie shores in just over two weeks, Apple is primed to endear itself to business consumers. But despite the hype and anticipation, business success isn’t guaranteed as the iPhone faces stiff competition from devices with long established roots in the sector.
Ashley Clark Jun 24 2008 4:25PM Telco/ISP
Review: Optenet Mailsecure Appliance

Review: Optenet Mailsecure Appliance

The Optenet Mailsecure CCOTTA Appliance brings all of the features of Optenet software products into one easy-to-manage place.
Peter Stephenson, Jun 24 2008 9:56AM Security
If you can't trust the compliance officer, whom can you trust?

If you can't trust the compliance officer, whom can you trust?

The insider threat is the main security risk enterprises face -- insider incidents from using system administrator or privileged account access are responsible for nine out of 10 breaches in data security.
Calum Macleod, european director, Cyber-Ark Jun 23 2008 3:14PM Security
Can Australia lead global R&D?

Can Australia lead global R&D?

The Australian technology industry needs the support of the Government to secure an innovative advantage for the country, according to the Australian Information Industry Association (AIIA).
Liz Tay Jun 23 2008 12:00PM Strategy
Review: GFi MailSecurity

Review: GFi MailSecurity

GFi MailSecurity offers protection from email-based threats, such as viruses or trojans.
Peter Stephenson, Jun 20 2008 3:27PM Security
Setting the stage for the latest PCI deadline

Setting the stage for the latest PCI deadline

June 30 marks an important date for any company that takes online credit card payments.
Michael Weider, director of security solutions, IBM Ration Jun 19 2008 2:43PM Security
Review: eSoft ThreatWall 450

Review: eSoft ThreatWall 450

The eSoft ThreatWall is a full scale email content management appliance with several excellent features.
Peter Stephenson, Jun 19 2008 2:29PM Security
Review: MessageGate

Review: MessageGate

MessageGate focuses on three areas. The first area is employee usage and policy compliance.
Peter Stephenson, Jun 18 2008 3:14PM Security
Does cyber-terrorism exist?

Does cyber-terrorism exist?

Global security experts gathered in Malaysia last month to help ramp up the world’s defenses against cyber-terrorism.
Negar Salek Jun 18 2008 2:30PM Security
Inside the Insider

Inside the Insider

Neville Isdell said that the breach “…underscores the responsibility we each have to be vigilant in protecting our trade secrets. Information is the lifeblood of the company.”
Carlo Minassian, Founder & CEO, Earthwave Jun 17 2008 2:05PM Security
Review: IBM Proventia Network Mail Security System

Review: IBM Proventia Network Mail Security System

The IBM Proventia Network Mail Security System is just that, a full-on mail security system. This product features some high grade functionality for the large enterprise.
Peter Stephenson, Jun 17 2008 12:51PM Security
Your broken computer is China's garbage dump

Your broken computer is China's garbage dump

There’s no doubting that Australia loves technology. We’re often hailed as an early adopter of technology and if our voracious appetite for anything and everything new – Blu-Ray, iPhone, plasma televisions, computers – is anything to go by, the assessments are spot on. But what happens when today’s toys turn into tomorrow’s trash?
Mitchell Bingemann Jun 16 2008 4:43PM Hardware
The technologist's guide to the near future

The technologist's guide to the near future

Technological convergence has shaped many aspects of today’s world, from the creation of medical technologies to devastating events like 9/11, according to U.S. physicist and science fiction author Stanley Schmidt.
Liz Tay Jun 16 2008 3:53PM Strategy
Review: Secure Computing IronMail

Review: Secure Computing IronMail

The Secure Computing IronMail appliance is designed for the large enterprise and it is loaded with many great features.
Peter Stephenson, Jun 16 2008 10:36AM Security

Log In

  |  Forgot your password?