policy

Review: F-Secure Policy Manager

Review: F-Secure Policy Manager

System administrators used to wish this sort of tool existed.
Ben Till Jun 5 2004 12:00AM Security
Review: Policy Patrol

Review: Policy Patrol

This application works alongside Exchange and can be installed either on the same machine or on a separate server.
Staff Writers Jun 1 2004 12:00AM Security
PDA Security Policy - Worth Its Weight in Gold

PDA Security Policy - Worth Its Weight in Gold

Nowadays, it seems like everybody has a PDA. However, as an inevitable corollary, it seems like everyone is eventually bound to misplace their PDA.
Oba McMillan Jan 19 2004 9:50AM Security
Educating and Policing with Policy

Educating and Policing with Policy

By nature, human beings take the easiest route. Every one of us is all about the path of least resistance
Illena Armstrong Jan 16 2004 12:53PM Security
Cryptographic Policy - What’s the Blowback?

Cryptographic Policy - What’s the Blowback?

In early 2000, Americans became aware of a common U.S. Intelligence term called ‘blowback.’
Melisa LaBancz-Bleasdale Jan 16 2004 12:48PM Security
From Business Policy to Network Policy

From Business Policy to Network Policy

At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House Jan 14 2004 3:40PM Security
PKI Policy in the Business Environment

PKI Policy in the Business Environment

In the traditional world, the individual moves through differing process and policy environments in which varying policies govern their interactions with others.
John T. Jan 14 2004 3:29PM Security
Policy that lives: Enforcing security in spite of the users

Policy that lives: Enforcing security in spite of the users

Creating a security policy may be hard, says Illena Armstrong, but making sure that users comply is always the biggest problem
Illena Armstrong Jan 13 2004 3:22PM Security
The Need for Quality Security Policy Enforcers

The Need for Quality Security Policy Enforcers

The need for qualified network and systems security administrators is on the increase.
Anthony T. Jan 12 2004 2:59PM Security
The Five Critical Stages of Policy Management

The Five Critical Stages of Policy Management

A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard Jan 12 2004 1:43PM Security
Making Your Security Policy Work

Making Your Security Policy Work

This question was raised at a recent shareholders meeting: “Can the Board of Directors assure us that this organization’s information security program is deployed fairly and legally in every jurisdiction in which we operate?”
William J Jan 12 2004 12:38PM Security
Security Policy Management: Email Risk Controls

Security Policy Management: Email Risk Controls

E-policy is a corporate statement and set of rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Ann James Jan 12 2004 12:32PM Security
Touching a Raw Nerve: Medical Privacy Policy

Touching a Raw Nerve: Medical Privacy Policy

Not surprisingly, the Bush Administration’s recent ‘final ruling’ on medical information privacy did not satisfy everyone.
Elizabeth J. Jan 12 2004 10:26AM Security
Simple, Efficient Security Products are the Key to Successful Policy Enforcement

Simple, Efficient Security Products are the Key to Successful Policy Enforcement

Whether the problems lie with the end-user or at the board-level, with reticence or apathy, policy enforcement is one of the greatest challenges in securing the corporate network.
Jon Callas Jan 12 2004 10:11AM Security
Taking a Proactive Approach to System Security Policy Compliance

Taking a Proactive Approach to System Security Policy Compliance

Information security is a reactive world.
Fred Pinkett Jan 9 2004 3:13PM Security
The Different Faces of Policy Enforcement

The Different Faces of Policy Enforcement

The traditional “triple A’s” of access security, Authentication, Authorization, and Accounting, have been joined by a newcomer - Auditing. Like its predecessors, auditing is most effective when enforced, rather than being voluntary.
Stacey Lum Jan 9 2004 1:46PM Security
Embracing Mobility: Three Steps to an Effective Mobile Security Policy

Embracing Mobility: Three Steps to an Effective Mobile Security Policy

Mobile technology has arrived.
Tom Goodman Jan 9 2004 1:42PM Security
Review: F-Secure Policy Manager

Review: F-Secure Policy Manager

F-Secure's offering includes several components: a Policy Manager (the hub of the suite), an Anti-Virus Management Wizard and the Policy Manager Reporting Option.

Jon Tullett Jul 1 2003 12:00AM Security
Review: Policy Patrol

Review: Policy Patrol

There are now many policy management tools for the control of email usage, and that need arises from the growing requirements that increasing legislation has put on companies. Policy Patrol is one such solution, ensuring that certain criteria are being met, and reducing the risk to the enterprise by monitoring communications and filtering out according to a rule set.

There are pre-set policies that allow the new installation to be put in place quickly and effectively while new policies are written.

Jayne Parkhouse Mar 1 2003 12:00AM Security
Review: Active Administrator

Review: Active Administrator

In this Group Test we have looked at a number of solutions, all designed to manage your critical policy management and to ensure corporate policy is adhered to across even the largest networks.

This particular solution is for Windows 2000 users only; it sets, manages and backs up policies across your whole network without the need for agents. Designed specifically to replace the built-in utilities that are provided with Windows 2000 networks, it also allows the management of multiple domains in unison.

Jayne Parkhouse Mar 1 2003 12:00AM Security

Log In

  |  Forgot your password?