control

Spam hits new heights in February – but “under control soon”

Spam hits new heights in February – but “under control soon”

New figures published by Brightmail show that the scourge of spam continues to grow, despite legislation aimed at stopping it.
Ron Condon Mar 4 2004 12:29PM Security
Central control: Let’s get it all together

Central control: Let’s get it all together

Chris Pick outlines the pressures that are driving some organisations to integrate security and systems management
Chris Pick Jan 13 2004 5:08PM Security
Control System Security in the Age of Cyberterrorism

Control System Security in the Age of Cyberterrorism

Power producers and utilities today face an unprecedented quantity of constraints upon their business operations.
Brian M. Jan 9 2004 4:49PM Security
Review: Norman Virus Control

Review: Norman Virus Control

Norman delivered quick and efficient performance, with acceptable, but unexceptional, reporting. Installation required Norman Virus Control to be installed first, for the AV engine. No reboot was required and, if anything, a surprising lack of feedback resulted - the software just quietly went to work with the default server configuration.

Jon Tullett Jan 1 2004 12:00AM Security
Review: NetOp Remote Control

Review: NetOp Remote Control

Sometimes dialing into access data just isn't enough, and NetOp Remote Control allows remote access for the control of multiple PCs. This allows users to remotely initiate work from a distant location on their office workstation, enabling work to continue when they are unable to physically be at their desk. It can also provide useful and cost-efficient support from administration for problem solving, staff training and observation, or simply data use, all rolled into one.

NetOp Remote Control secures the communication while allowing authorized access. Controlling a keyboard and mouse, and viewing the screen of a remote computer is made easy with this solution, which makes an ideal tool for administration and management purposes wherever the skilled user is located. This means that a business can employ an expert at one location, but the enterprise can benefit from his or her expertise in branch offices no matter how diverse they may be ­ geographically.

Jayne Parkhouse Feb 1 2003 12:00AM Security
Review: SmartLine DeviceLock

Review: SmartLine DeviceLock

One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.

Staff Writers Jan 1 2003 12:00AM Security
Review: Symark PowerBroker

Review: Symark PowerBroker

If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.

Staff Writers Jan 1 2003 12:00AM Security
Review: Adhaero Doc

Review: Adhaero Doc

Access control comes in many flavors, depending on what you want or don't want users to have access to. Now it's the turn of other documents to get some added protection with Adhaero's business document security solution. This protection extends beyond the network, and documents under its aegis can only be read by authorized eyes. It allows Word, Excel, PowerPoint and Outlook objects to be encrypted, and then assigns digital rights that dictate what can be done to them.

Staff Writers Jan 1 2003 12:00AM Security
Review: Baltimore SelectAccess

Review: Baltimore SelectAccess

Baltimore has produced one of the best access control products currently on the market. Select-Access is a welcome step forward in access control.

Staff Writers Jan 1 2003 12:00AM Security
Review: eTrust AccessControl

Review: eTrust AccessControl

We are back in the world of passwords for Computer Associates' offering. Part of the eTrust suite of products, eTrust AccessControl is another policy-based application, fully integrated with the other eTrust products, as well as with CA's UniCenter network management software. It is designed to operate in Windows, Unix and Linux, and interoperates with (surprising, but not unwelcome), mainframe environments.

Staff Writers Jan 1 2003 12:00AM Security
Review: Novell Account Management

Review: Novell Account Management

Novell is no stranger to access management; such functionality was built into its NetWare operating system from day one, and is an integral part of its Directory Services offering. So, it comes as no surprise to see a standalone Novell product in this Group Test.

Staff Writers Jan 1 2003 12:00AM Security
Review: SmartLine DeviceLock

Review: SmartLine DeviceLock

One potential security loophole that is frequently overlooked is access to removable media. Many access control products will bar your way into the file server, log your attempts to look at the payroll database, and prevent you from using certain applications, but this is all at the system level.

Staff Writers Jan 1 2003 12:00AM Security
Review: Symark PowerBroker

Review: Symark PowerBroker

If you think Unix houses have been ignored in this test, Symark's PowerBroker is just for you. Supporting multiple flavors of Linux and Unix - including IBM S390 Linux - PowerBroker ensures Unix administrative privileges can be safely managed and delegated.

Staff Writers Jan 1 2003 12:00AM Security

Log In

  |  Forgot your password?