Features

Review: Novell Identity Manager 3.5

Review: Novell Identity Manager 3.5

Novell Identity Manager is a complete identity management system, a workflow system that simplifies both provisioning and binding users to objects, a compliance auditing system, single sign-on, a designer component that allows drag and drop development of policies and workflows and a user interface that is both comprehensive and easy to use.
Peter Stephenson,CeRNS, Jan 16 2008 4:08PM Security
Review: TACS

Review: TACS

The TriCipher Armored Credential System (TACS) is a truly integrated system that delivers authentication combining the strength of PKI with the ease of entering a user name and password. TACS’ main components are the ID vault, a FIPS 140-2 level 2-rated appliance that manages user information, digitally signs transactions and authenticates.
Peter Stephenson,CeRNS, Jan 14 2008 2:58PM Security
Review of 2007: Lost in translation

Review of 2007: Lost in translation

Large-scale data breaches across both the private and public sectors dominated the news throughout the year. Rob Buckley looks back.
Rob Buckley Jan 14 2008 2:58PM Security
Review: PassGo Defender v5.2

Review: PassGo Defender v5.2

Defender 5 deploys strong two-factor authentication controlled within Windows Active Directory to ensure that only authorised users have access to protected resources. It supports administration for multiple token types including hardware, software and Mobil SMS.
Peter Stephenson,CeRNS, Jan 11 2008 2:53PM Security
The Illusion of Privacy

The Illusion of Privacy

The public's idea of confidentiality is not compatible with the way their details are handled.
Tim Mather Jan 11 2008 2:52PM Security
Review: Evidian Wiseguard

Review: Evidian Wiseguard

WiseGuard is one piece of the much larger Evidian Identity and Access Management (IAM) Suite. This product focuses only on integrating single sign-on into an existing environment. However, it does have some great features.
Peter Stephenson,CeRNS, Jan 10 2008 2:54PM Security
Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches

Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches

A recent survey of 100 IT managers and CIOs from the financial services, health care, retail, manufacturing and government business sectors shows that despite a torrent of bad press on data-security breaches involving FTP (file-transfer protocol), its use is prevalent and growing.
William McKinney Jan 9 2008 3:11PM Security
Review: Courion Enterprise Provisioning

Review: Courion Enterprise Provisioning

Courion’s Enterprise Provisioning Suite can be summed up as a fully adaptable, tailor-made identity-management solution. Users can select specific components of the suite and have a platform that meets their specific needs. The process starts with what Courion calls Jump Start. This is exactly what it sounds like, getting the process up and running out of the box.
Peter Stephenson,CeRNS, Jan 9 2008 3:03PM Security
A new year’s security resolution

A new year’s security resolution

As we put the festivities behind us and fix our sights firmly on the year ahead, those criminal gangs involved in the nefarious activities of spam creation, phishing and virus attacks continue to engage new tactics that will take advantage of our relaxed, less cautious frame of mind.
Mark Sunner Jan 8 2008 3:16PM Security
Review: ZyXEL ZyWALL USG 300

Review: ZyXEL ZyWALL USG 300

A good all-around product with a large feature set. The unit can be a bit of a challenge for organizations that do not need all of the included features.
Justin Peltier Jan 7 2008 3:25PM Security
Guest column: Expensive data pitfalls in service-oriented architectures today

Guest column: Expensive data pitfalls in service-oriented architectures today

In theory, SOAs have the potential to deliver greater efficiency and economies of scale in the enterprise, through a more flexible approach. In practice, however, SOAs have swallowed millions of dollars of investment in IT infrastructure while failing to satisfy business demands for reduced costs, greater agility, and competitive advantage in increasingly fast-paced global marketplaces.
Laurie Newman Dec 27 2007 11:10AM Hardware
Australian telcos champion Voice over Broadband for SMBs

Australian telcos champion Voice over Broadband for SMBs

Voice over Internet Protocol (VoIP) is not a new term. Touted as a low cost alternative to traditional telephony, VoIP has a major role in a new wave of converged network solutions that are pervading the telecommunications market.
Liz Tay Dec 24 2007 11:53AM Telco/ISP
Web threats make their mark on 07/08

Web threats make their mark on 07/08

The new year is supposed to signal a fresh start for us all, but web threats will continue to reign in 2008, wreaking havoc just as they did this year
Negar Salek Dec 24 2007 9:26AM Security
Review: SC Magazine picks the cream of the crop

Review: SC Magazine picks the cream of the crop

SC Magazine's technology experts have made their choices for the best products of 2007 from among the dozens of entries that were subjected to thorough group tests and reviews during the year.
Staff Writers Dec 21 2007 12:12PM Security
Roundup 2007: The year's top fives

Roundup 2007: The year's top fives

TOP 5 CYBERATTACKS:

1. The Storm Worm
What began as an email-spawned trojan attack using fake news stories to lure victims became the most widespread cyber-assault in recent memory. Still replicating, and exploiting a number of patched vulnerabilities, the botnet-fueled, socially engineered attack may make next year's list as well.
Staff Writers Dec 21 2007 11:43AM Security
The SC interview online: Eva Chen

The SC interview online: Eva Chen

Co-founder and CEO of Trend Micro, Eva Chen discusses a wide range of subjects touched on financials, industry moves and trends, and the opportunities provided by the emerging markets of India and China.
Paul Fisher Dec 21 2007 10:42AM Security
Review: Industry innovators 2007: PGP Encryption

Review: Industry innovators 2007: PGP Encryption

In discussing innovation with people from PGP, we made a very interesting discovery. What we classically think of as PGP encryption actually is only a small part of the view that the company has of the product line and the mission of the company.
Peter Stephenson, Dec 20 2007 3:06PM Security
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Eldad Maniv Dec 20 2007 11:02AM Software
Eight New Year's security resolutions for 2008

Eight New Year's security resolutions for 2008

2008 will usher in more security issues whose challenges can only be met by an array of security solutions. Now is the time to start thinking about your 2008 New Year's security resolutions.
Kevin Prince CSO, Perimeter eSecurity Dec 19 2007 4:11PM Security
A disservice to security?

A disservice to security?

Software as a service may seem good news for users, but it could also be an open invitation for attackers.
Ian Castle Dec 18 2007 2:30PM Security

Log In

  |  Forgot your password?