Features

Review: Stonesoft StoneGate FW-5000

Review: Stonesoft StoneGate FW-5000

Stonesoft offers a variety of firewall platforms designed to meet the needs of various sized organisations.
Justin Peltier Dec 18 2007 11:12AM Security
The eight myths of data encryption

The eight myths of data encryption

How misconceptions about data encryption are preventing A/NZ companies from effectively protecting data exchanged with employees, partners and suppliers.

Simon Coffey Dec 17 2007 11:44AM Security
Review: PureFile V3.1.3

Review: PureFile V3.1.3

This product is not, in the strictest sense of the term, an extrusion detection product. Rather, it is an audit/ inspection tool that finds information hidden in files.
Peter Stephenson, Dec 13 2007 10:59AM Security
Roundup 2007: Gazing into the crystal ball

Roundup 2007: Gazing into the crystal ball

SC US handed out crystal balls to several analysts, consultants, professors and CSOs and asked them to answer questions about next year.
Dan Kaplan Dec 11 2007 3:04PM Security
Review: Code Green CI Appliance 1500

Review: Code Green CI Appliance 1500

External threats to network security have always grabbed the headlines, but it's a well-known fact that the biggest dangers are likely to come from inside your perimeter.
Peter Stephenson, Dec 10 2007 1:33PM Security
The breakdown in network security design

The breakdown in network security design

The widespread dissemination of information and processing power has created a constantly evolving security dilemma: how to create and provide access to secure networks.
Ken Salchow Dec 7 2007 12:08PM Security
PCI compliance: The driving force towards better network security

PCI compliance: The driving force towards better network security

The Payment Card Industry (PCI) Data Security Standard is unique compared to other security standards, as PCI provides strong guidance as to how merchants can actually comply with its requirements.
Dave Anderson Dec 6 2007 3:04PM Security
Review: Nowell Group SpyForce-Al, v2.0

Review: Nowell Group SpyForce-Al, v2.0

This is, certainly, the most unusual product in this group. SpyForce-AI is touted as “...a counter-espionage security software system that defeats the Insider Security Threat.”
Peter Stephenson, Dec 6 2007 3:02PM Security
Review: ZyXEL ZyWALL USG 300

Review: ZyXEL ZyWALL USG 300

The offering from ZyXEL is an appliance-based offering that runs on a 1U rack mounted device.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 5 2007 4:00PM Security
Review: Bioscrypt VeriSoft v2.0

Review: Bioscrypt VeriSoft v2.0

Strong biometrics and integration of other authentication methods is the focus of VeriSoft.
Peter Stephenson, Dec 4 2007 12:25PM Security
Review: BigFix DLP 1.1

Review: BigFix DLP 1.1

BigFix DLP (data leak prevention) is a full-featured part of the BigFix product suite. It is unique among many of the products in this market in that it does everything at the endpoint (desktop).
Peter Stephenson, Dec 3 2007 4:05PM Security
Virtualisation - savings not without threats

Virtualisation - savings not without threats

Karl Hart doesn't need to read articles or watch the evening news to know that financially motivated hackers nowadays are finding easy pickings at colleges and universities across the country.
Dan Kaplan Dec 3 2007 3:01PM Security
Review: McAfee Data Loss Prevention Appliance

Review: McAfee Data Loss Prevention Appliance

This set of products is used with the McAfee ePolicy Orchestrator, which must be installed before you can install extrusion prevention.
Peter Stephenson, Nov 30 2007 3:10PM Security
I search therefore I am ..

I search therefore I am ..

Yet another politician has suggested that blocking the web can save us from terrorists. If only life was that simple.
Nick Barron Nov 29 2007 3:46PM Security
Review: Secure Computing Corporation Sidewinder 7.0

Review: Secure Computing Corporation Sidewinder 7.0

The device from Secure Computing is an appliance-based offering that runs on a 1U rack mounted device. The Sidewinder provides two Ethernet interfaces, which can be separately addressed and configured.
Justin Peltier Nov 29 2007 3:39PM Security
Petascale computers: the next supercomputing wave

Petascale computers: the next supercomputing wave

The author of the world's first published collection on petascale techniques, David A. Bader, discusses petascale, exascale and the future of computing.
Liz Tay Nov 29 2007 11:18AM Hardware
Can Naked DSL force Telstra to loosen its belt?

Can Naked DSL force Telstra to loosen its belt?

With ISPs now able to strip away line rental and offer Naked DSL, should Telstra be worried?
Mitchell Bingemann Nov 29 2007 7:29AM Telco/ISP
Social networks: To ban or not to ban?

Social networks: To ban or not to ban?

IT security teams across the globe must be getting used to requests to ban employee access to certain websites.
Staff Writers Nov 28 2007 3:52PM Security
Review: Code Green Networks Content Inspection Appliance

Review: Code Green Networks Content Inspection Appliance

Code Green Networks CI-1500 Content Inspection Appliance, v4 is a good middle of the road extrusion detection appliance.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 27 2007 4:01PM Security
Hotel room security: Service not included

Hotel room security: Service not included

From keycards to mini bars, modern technology has equipped hotel rooms with multiple vulnerabilities. One of our consultants had his personal laptop stolen from a locked hotel room recently. There was no evidence of a forced entry, suggesting an inside job.
Ken Munro Nov 27 2007 3:35PM Security

Log In

  |  Forgot your password?