Features

Review: Imprivata OneSign v3.6

Review: Imprivata OneSign v3.6

Convergence is the best word to sum up this appliance-based offering. Imprivata OneSign brings together three pieces of identity management. The first is authentication management, which replaces Windows-based authentication with stronger methods that can be managed in one place.
Peter Stephenson,CeRNS, Jan 22 2008 12:00AM Security
Focus on: The firewall

Focus on: The firewall

One of the most trusted security elements, it can nonetheless be misconfigured and play right into the hands of the hacker.
Staff Writers Jan 21 2008 2:30PM Security
Review: Actividentity 4tress AAA v6.5

Review: Actividentity 4tress AAA v6.5

The 4tress AAA Server offers scalable authentication, authorisation and accounting services. It is supported by LDAP and SQL databases, allowing centralised administration with fully distributed user authentication.
Peter Stephenson,CeRNS, Jan 21 2008 11:51AM Security
Review: ProtectID

Review: ProtectID

StrikeForce’s ProtectID provides an open-architecture platform for strong user authentication. The product allows multiple authentication methods such as biometrics and mobile-phone authentication for remote users to be mixed and matched for customers needing multi-layered security access. No middleware is needed, thanks to its ability to link directly to a domain controller.
Peter Stephenson,CeRNS, Jan 18 2008 4:01PM Security
Review: Secureauth

Review: Secureauth

Coupled with Cisco Adaptive Security Appliance (ASA) SSL VPN, SecureAuth can offer same-day deployment with x.509 level user authentication. The product integrates seamlessly with many third-party applications such as Microsoft Active Directory, SQL and Oracle database.
Peter Stephenson,CeRNS, Jan 17 2008 4:21PM Security
 Preventing security breaches from inside your private network

Preventing security breaches from inside your private network

Too often, network security relies on placing firewalls in front of public network access points and calling it a day. The assumptions are 1) being on a private network is synonymous with being on campus 2) campus users are implicitly trustworthy and 3) external threats are mitigated by the perimeter firewall.
Jan 16 2008 4:15PM Security
Review: Novell Identity Manager 3.5

Review: Novell Identity Manager 3.5

Novell Identity Manager is a complete identity management system, a workflow system that simplifies both provisioning and binding users to objects, a compliance auditing system, single sign-on, a designer component that allows drag and drop development of policies and workflows and a user interface that is both comprehensive and easy to use.
Peter Stephenson,CeRNS, Jan 16 2008 4:08PM Security
Review: TACS

Review: TACS

The TriCipher Armored Credential System (TACS) is a truly integrated system that delivers authentication combining the strength of PKI with the ease of entering a user name and password. TACS’ main components are the ID vault, a FIPS 140-2 level 2-rated appliance that manages user information, digitally signs transactions and authenticates.
Peter Stephenson,CeRNS, Jan 14 2008 2:58PM Security
Review of 2007: Lost in translation

Review of 2007: Lost in translation

Large-scale data breaches across both the private and public sectors dominated the news throughout the year. Rob Buckley looks back.
Rob Buckley Jan 14 2008 2:58PM Security
Review: PassGo Defender v5.2

Review: PassGo Defender v5.2

Defender 5 deploys strong two-factor authentication controlled within Windows Active Directory to ensure that only authorised users have access to protected resources. It supports administration for multiple token types including hardware, software and Mobil SMS.
Peter Stephenson,CeRNS, Jan 11 2008 2:53PM Security
The Illusion of Privacy

The Illusion of Privacy

The public's idea of confidentiality is not compatible with the way their details are handled.
Tim Mather Jan 11 2008 2:52PM Security
Review: Evidian Wiseguard

Review: Evidian Wiseguard

WiseGuard is one piece of the much larger Evidian Identity and Access Management (IAM) Suite. This product focuses only on integrating single sign-on into an existing environment. However, it does have some great features.
Peter Stephenson,CeRNS, Jan 10 2008 2:54PM Security
Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches

Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches

A recent survey of 100 IT managers and CIOs from the financial services, health care, retail, manufacturing and government business sectors shows that despite a torrent of bad press on data-security breaches involving FTP (file-transfer protocol), its use is prevalent and growing.
William McKinney Jan 9 2008 3:11PM Security
Review: Courion Enterprise Provisioning

Review: Courion Enterprise Provisioning

Courion’s Enterprise Provisioning Suite can be summed up as a fully adaptable, tailor-made identity-management solution. Users can select specific components of the suite and have a platform that meets their specific needs. The process starts with what Courion calls Jump Start. This is exactly what it sounds like, getting the process up and running out of the box.
Peter Stephenson,CeRNS, Jan 9 2008 3:03PM Security
A new year’s security resolution

A new year’s security resolution

As we put the festivities behind us and fix our sights firmly on the year ahead, those criminal gangs involved in the nefarious activities of spam creation, phishing and virus attacks continue to engage new tactics that will take advantage of our relaxed, less cautious frame of mind.
Mark Sunner Jan 8 2008 3:16PM Security
Review: ZyXEL ZyWALL USG 300

Review: ZyXEL ZyWALL USG 300

A good all-around product with a large feature set. The unit can be a bit of a challenge for organizations that do not need all of the included features.
Justin Peltier Jan 7 2008 3:25PM Security
Guest column: Expensive data pitfalls in service-oriented architectures today

Guest column: Expensive data pitfalls in service-oriented architectures today

In theory, SOAs have the potential to deliver greater efficiency and economies of scale in the enterprise, through a more flexible approach. In practice, however, SOAs have swallowed millions of dollars of investment in IT infrastructure while failing to satisfy business demands for reduced costs, greater agility, and competitive advantage in increasingly fast-paced global marketplaces.
Laurie Newman Dec 27 2007 11:10AM Hardware
Australian telcos champion Voice over Broadband for SMBs

Australian telcos champion Voice over Broadband for SMBs

Voice over Internet Protocol (VoIP) is not a new term. Touted as a low cost alternative to traditional telephony, VoIP has a major role in a new wave of converged network solutions that are pervading the telecommunications market.
Liz Tay Dec 24 2007 11:53AM Telco/ISP
Web threats make their mark on 07/08

Web threats make their mark on 07/08

The new year is supposed to signal a fresh start for us all, but web threats will continue to reign in 2008, wreaking havoc just as they did this year
Negar Salek Dec 24 2007 9:26AM Security
Review: SC Magazine picks the cream of the crop

Review: SC Magazine picks the cream of the crop

SC Magazine's technology experts have made their choices for the best products of 2007 from among the dozens of entries that were subjected to thorough group tests and reviews during the year.
Staff Writers Dec 21 2007 12:12PM Security

Log In

  |  Forgot your password?