Latest News
In Pictures: Sumo Logic roundtable on the evolving SIEM
In Pictures: Saviynt securing non-human identities Sydney roundtable
TPG Telecom hopes 'digital twin' can predict network, service disaster impacts
Monash University pilots graph database tech to map research ecosystem
AI providers plug metadata leak that exposed encrypted chat topics
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Tech Partner Views
PODCAST
EVENTS
Tech Data IT Summit
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
Features
Features
Review: Nowell Group SpyForce-Al, v2.0
This is, certainly, the most unusual product in this group. SpyForce-AI is touted as “...a counter-espionage security software system that defeats the Insider Security Threat.”
Peter Stephenson,
Dec 6 2007 3:02PM
Security
Review: ZyXEL ZyWALL USG 300
The offering from ZyXEL is an appliance-based offering that runs on a 1U rack mounted device.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Dec 5 2007 4:00PM
Security
Review: Bioscrypt VeriSoft v2.0
Strong biometrics and integration of other authentication methods is the focus of VeriSoft.
Peter Stephenson,
Dec 4 2007 12:25PM
Security
Review: BigFix DLP 1.1
BigFix DLP (data leak prevention) is a full-featured part of the BigFix product suite. It is unique among many of the products in this market in that it does everything at the endpoint (desktop).
Peter Stephenson,
Dec 3 2007 4:05PM
Security
Virtualisation - savings not without threats
Karl Hart doesn't need to read articles or watch the evening news to know that financially motivated hackers nowadays are finding easy pickings at colleges and universities across the country.
Dan Kaplan
Dec 3 2007 3:01PM
Security
Review: McAfee Data Loss Prevention Appliance
This set of products is used with the McAfee ePolicy Orchestrator, which must be installed before you can install extrusion prevention.
Peter Stephenson,
Nov 30 2007 3:10PM
Security
I search therefore I am ..
Yet another politician has suggested that blocking the web can save us from terrorists. If only life was that simple.
Nick Barron
Nov 29 2007 3:46PM
Security
Review: Secure Computing Corporation Sidewinder 7.0
The device from Secure Computing is an appliance-based offering that runs on a 1U rack mounted device. The Sidewinder provides two Ethernet interfaces, which can be separately addressed and configured.
Justin Peltier
Nov 29 2007 3:39PM
Security
Petascale computers: the next supercomputing wave
The author of the world's first published collection on petascale techniques, David A. Bader, discusses petascale, exascale and the future of computing.
Liz Tay
Nov 29 2007 11:18AM
Hardware
Can Naked DSL force Telstra to loosen its belt?
With ISPs now able to strip away line rental and offer Naked DSL, should Telstra be worried?
Mitchell Bingemann
Nov 29 2007 7:29AM
Telco/ISP
Social networks: To ban or not to ban?
IT security teams across the globe must be getting used to requests to ban employee access to certain websites.
Staff Writers
Nov 28 2007 3:52PM
Security
Review: Code Green Networks Content Inspection Appliance
Code Green Networks CI-1500 Content Inspection Appliance, v4 is a good middle of the road extrusion detection appliance.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Nov 27 2007 4:01PM
Security
Hotel room security: Service not included
From keycards to mini bars, modern technology has equipped hotel rooms with multiple vulnerabilities. One of our consultants had his personal laptop stolen from a locked hotel room recently. There was no evidence of a forced entry, suggesting an inside job.
Ken Munro
Nov 27 2007 3:35PM
Security
Review: SonicWALL PRO 4100
The solution from SonicWALL is an appliance-based offering which runs on a 1U rack mounted device. The PRO 4100 provides 10 Ethernet gigabit interfaces, which can be separately addressed and configured.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Nov 26 2007 2:02PM
Security
Interview: Adrian Chamberlain and Jos White
MessageLab's CEO and co-founder are determined to get a bigger slice of the American pie. Paul Fisher meets two men on a mission.
Paul Fisher
Nov 26 2007 12:30PM
Security
Torvalds on where Linux is headed in 2008
The creator of Linux is excited about solid-state drives, expects progress in graphics and wireless networking, and says the operating system is strong in virtualisation despite his personal lack of interest in the area.
Charles Babcock
Nov 26 2007 11:54AM
Software
Review: Tablus Content Alarm NW, v5.0
Tablus Content Alarm is a network-based tool that inspects data as it passes, and then performs appropriate actions in accordance with policies.
Peter Stephenson,
Nov 23 2007 3:10PM
Security
iPhone: Too high a price to pay?
The arrival of the iPhone could signal the beginning of the end for consumer choice. Now that the marketing blitz and customer hype about the Apple iPhone are reverting back to more realistic levels there comes some not entirely unexpected news...
Tim Mather
Nov 22 2007 10:36AM
Security
Review: Intelligent Wave CWAT, v3.1a
CWAT (cybercrime, warning, alert, termination, pronounced see-wat) is an extremely comprehensive insider threat management system. It is equally complicated to install and understand.
Peter Stephenson,
Nov 22 2007 10:29AM
Security
Six steps to securing next gen communications
The newest generation of employees connects with friends on Facebook and shares YouTube videos on lunch breaks or throughout the working day.
Staff Writers
Nov 22 2007 8:44AM
Security
Previous
Next
Most popular tech stories
ABC drops Salesforce for Braze
Westpac Intelligence Layer breaks cover
Suncorp creates a "clear execution roadmap" for agentic AI
Uniting uses GenAI to cut admin burden for frontline care workers
Qantas' digital and customer head steps down
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Telstra Purple acquires IoT specialists Alliance Automation, Aqura Technologies
Photos: Australian industry explores data for net zero
'Touch-free' smartphone controlled with head movements
Photos: The 2024 IoT Awards winners
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?