management

HP beefs up identity management with Trustgenix acquisition

HP beefs up identity management with Trustgenix acquisition

In a bid to improve the identity management functionality in its OpenView product range, HP has signed a definitive agreement to acquire Trustgenix, a provider of federated identity management technology.
William Eazel Dec 2 2005 11:26AM Security
New deal moves LogicaCMG deeper into government space

New deal moves LogicaCMG deeper into government space

LogicaCMG has picked up a new contract to deliver web content management for the Queensland State Government.
Tim Lohman Nov 7 2005 1:25PM Hardware
Novell Australia plays down local staff cuts

Novell Australia plays down local staff cuts

Novell has refused to comment on the size of its planned local job cuts in the face of the company’s current global restructure.
Tim Lohman Nov 7 2005 10:27AM Software
Developing a patch and vulnerability management strategy

Developing a patch and vulnerability management strategy

In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.
Alan Bentley Oct 20 2005 11:03AM Security
Liberty Alliance touts federated identity management guidelines

Liberty Alliance touts federated identity management guidelines

The Liberty Alliance Project today unveiled business and policy guidelines designed to help organizations cope with the business, legal and privacy challenges of deploying federated identity management.
William Eazel Oct 12 2005 9:55AM Security
Firms urged to revamp outdated identity management policies

Firms urged to revamp outdated identity management policies

Researchers warned today that there is a pressing need for companies to scrutinize existing identity management policies to keep pace with rapid developments in access technology and mobile devices.
William Eazel Oct 11 2005 1:06PM Security
Investing in identity management

Investing in identity management

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Dr. Martin Sep 26 2005 11:37AM Security
Review: Active Folders Content Manager

Review: Active Folders Content Manager

Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.

Eric Doyle Jul 27 2005 12:00AM Security
Review: MIMEsweeper for SMTP

Review: MIMEsweeper for SMTP

This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Adobe LiveCycle Policy Server

Review: Adobe LiveCycle Policy Server

Policy Server appeared with the release of Acrobat 7 earlier this year. It builds substantially on the encryption and password security of past editions of Acrobat and provides control over how Acrobat PDF format documents are accessed.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

ECM started as a Windows inventory management tool, but has moved with the times. This release turns it into a systems policy management and compliance system for Windows, Solaris and Red Hat.

Eric Doyle Jul 27 2005 12:00AM Security
Review: NETconsent

Review: NETconsent

Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Policy Commander

Review: Policy Commander

Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.

Eric Doyle Jul 27 2005 12:00AM Security
Review: PolicyMatter

Review: PolicyMatter

Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UniGuard-V34 & Port Authority 44

Review: UniGuard-V34 & Port Authority 44

The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Websense Enterprise

Review: Websense Enterprise

This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Total Event Log Management Suite

Review: Total Event Log Management Suite

This product manages and analyzes Windows server log files. While this activity is not limited to forensics, it is an important incident response tool.

Jon Tullett Jul 21 2005 12:00AM Security
BMC ups channel recruitment drive

BMC ups channel recruitment drive

Enterprise software vendor BMC wants more partners to help it drive into the identity and access management market.
Fleur Doidge Jun 24 2005 1:00PM Software

Log In

  |  Forgot your password?