policy

Security policy heart of ID protection

Security policy heart of ID protection

Gartner has called for an increased focus on organisational security policies following a spate of ID theft cases.
Staff Writers Jul 18 2006 1:35PM Security
Risk policy needs rethink

Risk policy needs rethink

Firms should take a broader view when assessing their security needs,
according to experts.
Phil Muncaster Jul 3 2006 9:20AM Security
U.K. firms under fire for ignoring policy

U.K. firms under fire for ignoring policy

Widespread failure to implement or enforce internet acceptable usage policies (AUPs) is leaving many U.K. companies open to potentially serious IT security breaches, newly published research has claimed.
William Eazel Mar 13 2006 12:44PM Security
Review: Active Folders Content Manager

Review: Active Folders Content Manager

Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.

Eric Doyle Jul 27 2005 12:00AM Security
Review: MIMEsweeper for SMTP

Review: MIMEsweeper for SMTP

This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Adobe LiveCycle Policy Server

Review: Adobe LiveCycle Policy Server

Policy Server appeared with the release of Acrobat 7 earlier this year. It builds substantially on the encryption and password security of past editions of Acrobat and provides control over how Acrobat PDF format documents are accessed.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

ECM started as a Windows inventory management tool, but has moved with the times. This release turns it into a systems policy management and compliance system for Windows, Solaris and Red Hat.

Eric Doyle Jul 27 2005 12:00AM Security
Review: NETconsent

Review: NETconsent

Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Policy Commander

Review: Policy Commander

Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.

Eric Doyle Jul 27 2005 12:00AM Security
Review: PolicyMatter

Review: PolicyMatter

Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UniGuard-V34 & Port Authority 44

Review: UniGuard-V34 & Port Authority 44

The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Websense Enterprise

Review: Websense Enterprise

This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Eric Doyle Jul 27 2005 12:00AM Security
AOL defends spam policy

AOL defends spam policy

AOL has turned the tables on the Florida emergency agency whose emails it is blocking. According to the ISP the blocked emails are a result of the Florida agency not processing its own emails correctly.
David Quainton May 4 2005 10:36AM Security
'Naive' government security policy panned

'Naive' government security policy panned

Government departments are leaving themselves open to attack by not sufficiently protecting computer systems, experts have warned.
David Quainton Apr 12 2005 4:20PM Security
Apple launches price match policy

Apple launches price match policy

Apple Computer Australia has announced a "price matching" policy which would see its direct online store match prices quoted by its reseller channel on Apple hardware and software product.
Byron Connolly Nov 22 2004 12:00AM Hardware
Telindus boosts security with peer-to-peer policy management

Telindus boosts security with peer-to-peer policy management

Telindus France has bolstered its network security with a policy management system designed to improve traffic management and reduce the impact of viruses and worms across its range of service offerings for broadband ISPs in France.
Robert Jaques Oct 18 2004 4:31PM Security
Resellers welcome Coalition ICT policy

Resellers welcome Coalition ICT policy

Resellers have cautiously welcomed the Coalition's ICT policy ahead of the polls, citing relief of public indemnity requirements as a big boon for channel players reliant on government contracts.
Fleur Doidge Sep 23 2004 12:00AM Strategy
Liquid Machines acquires Omniva Policy Systems

Liquid Machines acquires Omniva Policy Systems

Liquid Machines, a supplier of enterprise rights management software, has acquired Omniva Policy Systems, a California-based provider of secure e-mail technology.
Marcia Savage Sep 21 2004 10:53AM Security

Log In

  |  Forgot your password?