management

Vista licence changes enable cheaper desktop management

Vista licence changes enable cheaper desktop management

Vista licence update to allow for diskless PCs and virtualised desktops.
Tom Sanders Apr 3 2007 11:16AM Software
Product section: SC Lab takes a look at email content filtering, policy management products

Product section: SC Lab takes a look at email content filtering, policy management products

The theme in the labs this month was policy, policy and more policy. Lab manager Mike Stephenson looked at email content filtering, which depends on policies for its success, while reviewer Justin Peltier evaluated policy management products. In these two areas, policy determines success, but the two views are quite different.
Peter Stephenson,CeRNS, Mar 14 2007 7:17PM Security
LANDesk touts PC power management tools

LANDesk touts PC power management tools

Green initiative promises reduced expenses and better bottom lines.
Clement James Mar 8 2007 8:32AM Hardware
Liberty Alliance intros legal framework for ID management

Liberty Alliance intros legal framework for ID management

Document designed to help corporate legal teams.
Robert Jaques Mar 8 2007 8:32AM Security
Review: AEP Networks SmartGate

Review: AEP Networks SmartGate

AEP Networks’ SmartGate was the most unique solution we tested. This product is a secure authentication proxy that runs at the application level of the OSI model. The product is similar to a typical SSL VPN, but with added authentication components that make the user’s authentication tunnel more secure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 5 2007 12:00AM Security
Review: Cyber-Ark Password Vault

Review: Cyber-Ark Password Vault

The Cyber-Ark Password Vault software is another example of implementing a subset of identity management features with a focus on simplicity.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 26 2007 12:00AM Security
Review: M-Tech ID Synch and P Synch

Review: M-Tech ID Synch and P Synch

M-Tech ID Synch and P Synch are two companion programs that are available to perform identity management. The ID Synch package performs most of the identity management tasks including provisioning, workflow creation, distributed administration and reporting.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 26 2007 12:00AM Security
Oracle intros Linux management suite

Oracle intros Linux management suite

Management Pack for Linux offers Linux server lifecycle management.
Clement James Jan 24 2007 8:17AM Software
McAfee boosts management team

McAfee boosts management team

McAfee has announced three new editions to its senior management team.
Fiona Raisbeck Jan 8 2007 3:44PM Security
Review: SealedMedia E-DRM

Review: SealedMedia E-DRM

SealedMedia is a client/server implementation with four components. A license server manages what the company calls a classification-based rights model; a management website offers provisioning for users, rights model management and documentation; and a management console is used for administration. The final part is the desktop, the user's tool for sealing documents.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jan 8 2007 12:00AM Security
Review: Tenable Security Center

Review: Tenable Security Center

The Tenable Security Center has massive capability wrapped in a single, easy-to-navigate interface. While the overall use of the application is fairly intuitive, once users explore more deeply, they may find that it becomes complex and intricate. This allows for great flexibility, but also requires some time of using the product and learning how to maximize its capability for the specific environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: TriGeo SIM

Review: TriGeo SIM

From the time it is plugged in, all the way through day-to-day management, TriGeo SIM is simple to use. The appliance comes with many rule sets already preconfigured for most security situations, while setting rules for specific environments is made easy by the Rule Builder. This tool uses different modules with rule parts that you just drag and drop into the right place and the rule is created. Filters also are easy to configure using the same process. The main console interface is simple and intuitive to navigate as well.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: ID-Certify

Review: ID-Certify

We now find ourselves in a world of regulatory compliance. It didn't use to be that way, but it is a fact of life we cannot ignore. In a sense, it is good for us who administer and manage IT systems as it forces us to adopt responsible practices, especially around access control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Review: Solsoft Policy Server 7

Review: Solsoft Policy Server 7

Within any sizeable network, the issues around maintaining known configurations from a security perspective can become problematic. Similarly, maintaining a compliant infrastructure, together with its attendant processes, can represent quite a challenge. Add to this the requirements for change control, access control and other factors, and one can readily appreciate that this challenge can become significant in terms of both resource and cost.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
IBM to acquire Consul risk management

IBM to acquire Consul risk management

IBM today announced plans to acquire audit solutions provider Consul risk management in a move that further boosts the computing giant's security portfolio.
Dan Kaplan Dec 5 2006 4:46PM Security
Laptop theft, data exposure the result of poor mobile security management

Laptop theft, data exposure the result of poor mobile security management

Hearing news about yet another lost or stolen laptop and exposure of personal information is almost like having seen too many horror flicks. Shock has shifted to disbelief - plus numb outrage at the apparent inability of corporations and government to protect our private personal data.
Peter Larsson, Dec 5 2006 11:00AM Security
Patch management doesn't begin or end on Patch Tuesday

Patch management doesn't begin or end on Patch Tuesday

Many organisations appreciate the regularity of Patch Tuesday to better prepare and execute patch deployment. However, few organisations use the time prior to Patch Tuesday to efficiently prepare systems and people for rapid deployment.
Chris Andrew, Dec 5 2006 9:00AM Security
Oracle introduces identity management framework

Oracle introduces identity management framework

Identity Governance Framework aims to provide standards for personal data
exchange applications.
Shaun Nichols Nov 30 2006 12:51PM Security
CA joins virtualisation management frenzy

CA joins virtualisation management frenzy

Unicenter ASM r11.1 allows for dynamic re-allocation of system resources.
Tom Sanders Nov 29 2006 9:19AM Software
EMC touts embedded content management module

EMC touts embedded content management module

Storage vendor targets OEMs.
Clement James Nov 22 2006 10:48AM Storage

Log In

  |  Forgot your password?