access

Single system speeds police access to data

Single system speeds police access to data

South Wales force gains complete visibility of related case records.
Lisa Kelly Jul 13 2006 2:40PM Storage
Access in a compliance world

Access in a compliance world

Regulatory pressures continue to shape the demand for "more security" in IT operations. Sarbanes-Oxley is being implemented with a fair bit of grumbling, but it has caused many organizations to strengthen their security posture. CIOs who were previously stymied in their efforts to implement security programs can now wave the "Sarbanes-Oxley flag" to justify their IT investments.
Mary Ann Jul 6 2006 9:17PM Security
Firms fail to control World Cup access

Firms fail to control World Cup access

IT professionals are losing productivity because they are failing to control employee access to football on the internet, according to a security company.
Matt Chapman Jul 3 2006 9:20AM Security
Frost & Sullivan: Confusion about identity and access management

Frost & Sullivan: Confusion about identity and access management

Security within Australian organisations is being threatened by the confusion between the concepts of IT security and information security, researchers Frost & Sullivan have said.
Staff Writers Jun 28 2006 9:20AM Hardware
Review: Safe Access

Review: Safe Access

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Report: Former Red Cross worker with access to 1M SSNs charged with ID theft

Report: Former Red Cross worker with access to 1M SSNs charged with ID theft

A former employee with the American Red Cross’ St. Louis chapter – who had access to the Social Security numbers of 1 million people – has been indicted by a federal grand jury.
Frank Washkuch May 24 2006 8:40PM Security
Debate: Should the UK government have access to search engine records to help fight crime?

Debate: Should the UK government have access to search engine records to help fight crime?

Conleth McCallan Apr 7 2006 5:21PM Security
Best Remote Access

Best Remote Access

Overall Category Winner and Winner for Best SSL VPN: Nortel VPN Gateway
Staff Writers Mar 13 2006 8:32PM Security
Network Access Control market will soar to $3.9B by 2008

Network Access Control market will soar to $3.9B by 2008

Global manufacturer revenue for Network Access Control (NAC) enforcement will grow 1,100 percent, from $323 million to $3.9 billion between 2005 and 2008, new research has predicted.
William Eazel Jan 19 2006 10:01AM Security
Review: Nokia Secure Access System

Review: Nokia Secure Access System

This is not actually an SSL VPN, but a network security platform (IP300) on which you can then run other services – like an SSL VPN.
Jon Tullett Oct 3 2005 12:00AM Security
BMC ups channel recruitment drive

BMC ups channel recruitment drive

Enterprise software vendor BMC wants more partners to help it drive into the identity and access management market.
Fleur Doidge Jun 24 2005 1:00PM Software
Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Gary Tomlinson Jun 21 2005 12:30PM Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft

Debate: Two-factor authentication access control will not prevent fraud and identity theft

Bruce Schneier May 13 2005 12:26PM Security
So, friend or foe? ID management and access control

So, friend or foe? ID management and access control

Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe Feb 21 2005 5:14PM Security
In from the field: Complying with remote access rules

In from the field: Complying with remote access rules

The agricultural supplier turned to ActivCard to bring its remote access procedures into line with new federal rules.

Marcia Savage Feb 18 2005 4:04PM Security
Review: Evidian Secure Access Manager

Review: Evidian Secure Access Manager

This is a comprehensive product that offers managed access and SSO functionality to applications via the internet, terminal emulation or Windows. It can also be regarded as a modular component of the even broader Access Master suite, which includes additional components for provisioning, managing certificates and workflow and other functions.

Julian Ashbourn Feb 16 2005 12:00AM Security
Review: HP Open View Select Access

Review: HP Open View Select Access

HP OpenView Select Access 6.0 provides a sophisticated and scalable access management solution for online resources. It may be used for employees accessing intranet resources, for external users undertaking transactions with your organization via the internet, for partner organizations to share resources, or any mix of access.

Julian Ashbourn Feb 16 2005 12:00AM Security
Review: ActivCard Secure Remote Access Solution

Review: ActivCard Secure Remote Access Solution

ActivCard AAA Server has been designed for industrial or large-scale implementation. Its separate administrative console allows for delegation of multiple administrator roles if the situation calls for it. Installation of the software only requires a system large enough to hold Windows Server 2003 running as a Domain Controller.

Peter Stephenson,CeRNS, Feb 10 2005 12:00AM Security
The financial risks of uncontrolled user access

The financial risks of uncontrolled user access

Dangers are posed by ineffective provisioning of user access rights. A secure enterprise provisioning system can address specific risk areas highlighted by the FSA’s Financial Crime Sector Report.
Michael Burling Dec 8 2004 1:13PM Security
Cisco boosts access control with Perfigo acquisition

Cisco boosts access control with Perfigo acquisition

Cisco Systems is preparing to acquire privately-held Perfigo, a developer of packaged network access control solutions that provide endpoint policy analysis, compliance, and access enforcement capabilities.
Robert Jaques Oct 25 2004 2:33PM Security

Log In

  |  Forgot your password?