Features

Angels give wings to Australian start-ups

Angels give wings to Australian start-ups

As a nation that is home to a well-developed education system and world-class research institutions, Australia is often lauded as fertile grounds for innovation. But the outlook for young entrepreneurs may not be so rosy.
Liz Tay Jan 30 2008 4:13PM Financial Services
Browser wars

Browser wars

For all the hype about the relative security of the two most popular browsers, is Firefox really any more secure than Internet Explorer? For that matter, is it even possible, as a British company with a “zero-footprint” browser claims, to develop a truly secure browser?
Jim Carr Jan 30 2008 3:53PM Security
Review: ENCENTUATE IAM with iTAG 3.5

Review: ENCENTUATE IAM with iTAG 3.5

Encentuate Identity and Access Management (IAM) suite has many well-developed features that cover the full spectrum of administrator deployment and end-user authentication.
Peter Stephenson,CeRNS, Jan 29 2008 10:00AM Security
How do you protect what you don't know exists?

How do you protect what you don't know exists?

Almost every day there is news of a company's security breach and, increasingly, many of these incidents are originating from an employee or other internal source.
Alex Gorelik Jan 29 2008 9:30AM Security
Messaging security: A layered approach is needed

Messaging security: A layered approach is needed

Above and below. Left and right. In front and behind you. Use multi-dimensional security to fend off attackers, no matter where they come from.
Paul Henry Jan 25 2008 10:46AM Security
Review: ALADDIN eTOKEN

Review: ALADDIN eTOKEN

Aladdin’s eToken offers full enterprise-wide deployment and lifecycle management of all authentication tokens, users and support applications. The product uses an open standards-based architecture with support for security applications relying on configurable connecters.
Peter Stephenson,CeRNS, Jan 25 2008 12:00AM Security
Review: Sun Identity Manager

Review: Sun Identity Manager

The Sun Identity Manager is designed to play at a high level in a large environment. It focuses on creating and managing provisioning workflows quickly and easily, as well as helping with auditing and compliance.
Peter Stephenson,CeRNS, Jan 24 2008 11:26AM Security
Wasn't that encrypted?

Wasn't that encrypted?

Encryption is pointless if not applied to an entire session. It only gives users a false sense of security.
Ken Munro Jan 22 2008 11:26AM Security
Review: Imprivata OneSign v3.6

Review: Imprivata OneSign v3.6

Convergence is the best word to sum up this appliance-based offering. Imprivata OneSign brings together three pieces of identity management. The first is authentication management, which replaces Windows-based authentication with stronger methods that can be managed in one place.
Peter Stephenson,CeRNS, Jan 22 2008 12:00AM Security
Focus on: The firewall

Focus on: The firewall

One of the most trusted security elements, it can nonetheless be misconfigured and play right into the hands of the hacker.
Staff Writers Jan 21 2008 2:30PM Security
Review: Actividentity 4tress AAA v6.5

Review: Actividentity 4tress AAA v6.5

The 4tress AAA Server offers scalable authentication, authorisation and accounting services. It is supported by LDAP and SQL databases, allowing centralised administration with fully distributed user authentication.
Peter Stephenson,CeRNS, Jan 21 2008 11:51AM Security
Review: ProtectID

Review: ProtectID

StrikeForce’s ProtectID provides an open-architecture platform for strong user authentication. The product allows multiple authentication methods such as biometrics and mobile-phone authentication for remote users to be mixed and matched for customers needing multi-layered security access. No middleware is needed, thanks to its ability to link directly to a domain controller.
Peter Stephenson,CeRNS, Jan 18 2008 4:01PM Security
Review: Secureauth

Review: Secureauth

Coupled with Cisco Adaptive Security Appliance (ASA) SSL VPN, SecureAuth can offer same-day deployment with x.509 level user authentication. The product integrates seamlessly with many third-party applications such as Microsoft Active Directory, SQL and Oracle database.
Peter Stephenson,CeRNS, Jan 17 2008 4:21PM Security
 Preventing security breaches from inside your private network

Preventing security breaches from inside your private network

Too often, network security relies on placing firewalls in front of public network access points and calling it a day. The assumptions are 1) being on a private network is synonymous with being on campus 2) campus users are implicitly trustworthy and 3) external threats are mitigated by the perimeter firewall.
Jan 16 2008 4:15PM Security
Review: Novell Identity Manager 3.5

Review: Novell Identity Manager 3.5

Novell Identity Manager is a complete identity management system, a workflow system that simplifies both provisioning and binding users to objects, a compliance auditing system, single sign-on, a designer component that allows drag and drop development of policies and workflows and a user interface that is both comprehensive and easy to use.
Peter Stephenson,CeRNS, Jan 16 2008 4:08PM Security
Review: TACS

Review: TACS

The TriCipher Armored Credential System (TACS) is a truly integrated system that delivers authentication combining the strength of PKI with the ease of entering a user name and password. TACS’ main components are the ID vault, a FIPS 140-2 level 2-rated appliance that manages user information, digitally signs transactions and authenticates.
Peter Stephenson,CeRNS, Jan 14 2008 2:58PM Security
Review of 2007: Lost in translation

Review of 2007: Lost in translation

Large-scale data breaches across both the private and public sectors dominated the news throughout the year. Rob Buckley looks back.
Rob Buckley Jan 14 2008 2:58PM Security
Review: PassGo Defender v5.2

Review: PassGo Defender v5.2

Defender 5 deploys strong two-factor authentication controlled within Windows Active Directory to ensure that only authorised users have access to protected resources. It supports administration for multiple token types including hardware, software and Mobil SMS.
Peter Stephenson,CeRNS, Jan 11 2008 2:53PM Security
The Illusion of Privacy

The Illusion of Privacy

The public's idea of confidentiality is not compatible with the way their details are handled.
Tim Mather Jan 11 2008 2:52PM Security
Review: Evidian Wiseguard

Review: Evidian Wiseguard

WiseGuard is one piece of the much larger Evidian Identity and Access Management (IAM) Suite. This product focuses only on integrating single sign-on into an existing environment. However, it does have some great features.
Peter Stephenson,CeRNS, Jan 10 2008 2:54PM Security

Log In

  |  Forgot your password?