Features

Review: Trend Micro's InterScan Web Security

Review: Trend Micro's InterScan Web Security

Trend Micro’s InterScan Web Security Appliance (IWSA) is a real-time, security-rich tool for protecting organisations from web threats. IWSA’s new web reputation feature blocks users’ access to suspicious domains while performing website reputation scoring without the need of uploading updates.
Peter Stephenson, Apr 8 2008 7:06AM Security
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Amol Sarwate, Apr 8 2008 3:21AM Security
Review: Mcafee Internet Gateway 3000

Review: Mcafee Internet Gateway 3000

A strong feature set makes McAfee’s Security Internet Gateway (SIG) a heavy hitter in any organisation’s architecture. The SIG provides anti-virus scanning against all protocols, while anti-spyware scanning blocks potentially harmful spyware, cookies and adware from getting on to the network. To protect against spam the SIG uses an engine consisting of anti-spam, anti-phishing rule sets, permit-or-deny lists and a spam-learning feature. The SIG enforces policy and compliance issues regarding out-going data transmission as well as some forms of data leakage. This appliance is easily configurable by IT staff and, once configured, requires minimal administrator intervention.
Peter Stephenson,CeRNS, Apr 7 2008 4:00PM Security
First party fraud

First party fraud

As long as there has been credit granting there have been customers committing first party fraud.
Jasbir Anand, Actimize, Inc Apr 7 2008 3:36PM Security
Guest Column: Top 10 tips to consider when leveraging IP networks for collaborative applications

Guest Column: Top 10 tips to consider when leveraging IP networks for collaborative applications

The global proliferation of IP networks has spurred large businesses and government agencies to adopt voice over IP (VoIP) as a means of controlling operational expenses, improving employee connectivity and productivity, and gaining added flexibility and reliability.
Michael Marcellin Apr 7 2008 1:45PM Telco/ISP
Top five compliance challenges in a virtualised world

Top five compliance challenges in a virtualised world

Virtualisation is showing some extremely compelling ROI and transforming the way corporate IT provisions and administers not only the data center, but also the user desktop experience.
Chris Farrow, director of product strategy, Fortisphere Apr 4 2008 3:23PM Security
Review: Panda's GateDefender Integra 300

Review: Panda's GateDefender Integra 300

Panda’s GateDefender Integra comes as a complete-package UTM with many good features. These include a firewall, VPN, IPS, malware protection at the gateway using heuristics, spam and phishing protection at the gateway, plus a web content filter.
Peter Stephenson, Apr 4 2008 4:03AM Security
Review: Fortinet's FortiGate-200A

Review: Fortinet's FortiGate-200A

Fortinet’s FortiGate is another product that has not changed much since we last saw it. This device focuses on three layers of protection: first is a firewall and VPN; the second layer is IPS/IDS; and the final layer is securing content from viruses and spyware, web filtering and IM and P2P blocking.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 3 2008 11:46AM Security
Smartphone security beyond office walls

Smartphone security beyond office walls

With data becoming more mobile than ever, it is critical that companies have a pervasive security strategy across the corporate network.
Matt Bancroft, CMO, Mformation Technologies Inc. Apr 3 2008 11:42AM Security
Virtual business

Virtual business

Beyond the realm of virtual escorts, real estate agents, and other entrepreneurial start-ups, the Second Life business world has been traditionally dominated by the largest of the real-world companies.
Liz Tay Apr 2 2008 3:40PM Software
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

Clearswift's MIMEsweeper appliance takes web content management to the next level. This device is loaded with features way beyond the usual web filter.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 1 2008 12:00AM Security
The greatest vulnerability to come

The greatest vulnerability to come

Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz
Raphael Leiteritz Mar 31 2008 3:03PM Security
Review: BorderWare's Email Security Gateway v7.1

Review: BorderWare's Email Security Gateway v7.1

BorderWare Email Security Gateway incorporates two features: the intercept engine and the BorderWare security network (BSN). These work together seamlessly to provide solid protection against email, web and IM security threats.
Peter Stephenson, Mar 31 2008 2:18PM Security
Review: CP Secure's Content Secure Gateway

Review: CP Secure's Content Secure Gateway

CP Secure Content Security Gateway (CSG) provides real-time scanning using its own, patent-pending, stream-based technology. This dual-scan engine approach – one engine created by CP Secure, the second an integration of a Kaspersky Labs anti-virus engine – can protect all common protocols, HTTP, SMTP, POP3, IMAP and HTTPS.
Peter Stephenson, Mar 31 2008 2:17PM Security
Virtual law and you

Virtual law and you

Businesses in recent years have increasingly turned to virtual worlds for opportunities in advertising, recruiting, and online expansion. As real-world money and people migrate online, new questions are being raised about the legal implications of virtual behaviour.
Liz Tay Mar 27 2008 3:50PM Software
Fighting fraud with chip & PIN

Fighting fraud with chip & PIN

Chip and PIN credit cards are hitting Australian shores. Negar Salek, demystifies the emerging secure payment technology and its potential benefits.
Negar Salek Mar 27 2008 12:12PM Security
Going solo: How to be a security consultant

Going solo: How to be a security consultant

We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
Mark Mayne Mar 27 2008 12:04PM Security
Get ready for Identity 3.0

Get ready for Identity 3.0

We need an identity framework that combines strong authentication with anonymity.
Tim Mather Mar 27 2008 11:59AM Security
Review: McAfee's Secure Internet Gateway

Review: McAfee's Secure Internet Gateway

A strong feature set makes McAfee’s Security Internet Gateway (SIG) a heavy hitter in any organisation’s architecture. The SIG provides anti-virus scanning against all protocols, while anti-spyware scanning blocks potentially harmful spyware, cookies and adware from getting on to the network.
Peter Stephenson, Mar 26 2008 4:09PM Security
Legal matters: To delete or not to delete?

Legal matters: To delete or not to delete?

Some emails are important written records you might one day have to rely on in court, says Tamzin Matthew.
Tamzin Matthew Mar 26 2008 3:16PM Security

Log In

  |  Forgot your password?