Features

Sit back and do nothing

Sit back and do nothing

Our instinct is to fix bugs when we come across them, but sometimes that can cause more harm than good.
Nick Barron Oct 22 2007 3:00PM Security
Review: Stonesoft Stonegate SSL-6000

Review: Stonesoft Stonegate SSL-6000

Stonesoft offers an appliance for any size network. In this group test we looked at StoneGate SSL-6000 built to support up to 5000 concurrent users. The unit is a 3U rack mountable appliance delivered with three (two redundant) power supplies and is quite heavy.
Justin Peltier Oct 19 2007 11:42AM Security
‘Don’t judge a book by its cover on the WWW’

‘Don’t judge a book by its cover on the WWW’

AJAX, Web 2.0 security

No, you did not miss the memo or a software upgrade notice. Yet you’ve already arrived at Web 2.0. The “upgrade” from Web 1.0 to the new Web 2.0 world has been an evolutionary process, continually driving the Web to be more interactive, useful and interesting for consumers and the business community.
Paul Henry Oct 19 2007 11:27AM Security
Review: Bioscrypt v-station

Review: Bioscrypt v-station

Bioscrypt's V-Station is designed to provide biometric protection for physical access to areas of a building or a room.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 18 2007 12:09PM Security
Review: FingerPIN Matchlogon with FIngerPIN

Review: FingerPIN Matchlogon with FIngerPIN

The Matchlogon with FingerPIN system incorporates some nice features and functionality for deploying biometrics into an existing environment. The user enters a specific fingerprint sequence during enrollment and can use that sequence to logon to the workstation.
Peter Stephenson, Oct 17 2007 2:55PM Security
Review: Array Networks Universal Access Controller

Review: Array Networks Universal Access Controller

The Array Networks SPX Series Universal Access Controller is an appliance that provides a number of features through a browser-based SSL VPN approach. The SPX allows remote file access through SMB, browsing internal websites, access to internal mail servers and standard TCP-based services.
Justin Peltier Oct 16 2007 11:21AM Security
How to get more intelligent about smartphones

How to get more intelligent about smartphones

It was about four years ago when the IT department at Chris McClanahan's Fortune 500 financial services company began noticing a widespread influx of so-called smartphones seeking connection to the corporate network.
Dan Kaplan Oct 15 2007 12:02PM Security
Storage: Locked up

Storage: Locked up

Faced with ever more data to be kept, tougher regulations and high-profile security breaches, it's time to rethink storage.
Barry Mansfield Oct 11 2007 7:08AM Security
Progress against piracy

Progress against piracy

When Chinese law enforcement authorities in July rounded up members of two criminal organisations allegedly responsible for US$500 million in counterfeit software, it was hailed by the FBI and software vendors as a considerable blow to high quality Chinese counterfeiters.
Frank Washkuch Oct 10 2007 11:57AM Security
Briefing: Israel - Focus on the future

Briefing: Israel - Focus on the future

Born out of the need to protect the country, the Israeli infosec industry is emerging as a global leader.
David Quainton Oct 9 2007 3:19PM Security
Review: ZyXEL ZyWALL SSL 10

Review: ZyXEL ZyWALL SSL 10

ZyWall SSL-10 is a smaller appliance designed for ten concurrent users. Despite the size of the unit, it offered many of the features the larger units did.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 9 2007 2:00PM Security
When it comes to network security, there are no grey areas

When it comes to network security, there are no grey areas

Millions of applications are installed on company networks each day without the permission of the IT department. These pieces of software are known as ‘Greynets’. They are multiplying constantly and, with many remaining unknown to the IT team and others difficult to locate, are damaging network performance, distracting staff, and creating a hole in network defences.
Staff Writers Oct 8 2007 12:22PM Security
Review: Secured Email Enterprise v3.2

Review: Secured Email Enterprise v3.2

If we had to find one word to sum up this product it would be integration. This product has some very interesting features.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 5 2007 3:26PM Security
Be smart with your phone

Be smart with your phone

As we start to pay bills and surf the web from our mobile phones, it's not the handsets thieves will be after.
Ken Munro Oct 5 2007 8:04AM Security
Review: Utimaco Software SafeGuard MailGateway v5.2

Review: Utimaco Software SafeGuard MailGateway v5.2

The SafeGuard MailGateway brings together many useful features for email security and management. The main focus of this product is making everything centralised.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 4 2007 10:33AM Security
Review: Voltage SecureMail v3

Review: Voltage SecureMail v3

The Voltage SecureMail Gateway appliance incorporates several components that manage securing email content. The server itself provides policy-based encryption and centralised management and reporting.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 3 2007 9:39AM Security
Interview: Sourcefire's Martin Roesch

Interview: Sourcefire's Martin Roesch

Sourcefire’s founder and CTO Martin Roesch speaks to SC Magazine about the open-source security vendor’s expansion into the Australian market and the company's future plans.
Negar Salek Oct 2 2007 3:03PM Security
Not the same old SOX

Not the same old SOX

IT security consultant Jim Reavis may have recently offered a big-time scoop to readers of his blog. Citing unnamed sources, he reported that Symantec is in talks with some of its investors, an indication that the security giant may be considering a return to private status.
Dan Kaplan Oct 2 2007 12:18PM Security
Review: PGP Desktop enterprise Email

Review: PGP Desktop enterprise Email

PGP has been at the top of the market in email protection ever since it first was introduced as freeware in 1991. Since then it has matured, had several owners and now has its own home again.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 2 2007 11:53AM Security
Protecting cardholder data in e-Commerce transactions

Protecting cardholder data in e-Commerce transactions

More and more businesses are moving towards offering their products and services in an Internet-based environment and consumers will typically use a credit or debit card for e-commerce transactions.
Staff Writers Sep 28 2007 10:48AM Security

Log In

  |  Forgot your password?