Latest News
Woolworths' CSO is Optus-bound
Build once. Build right. The enduring power of Azure Landing Zones.
Lion builds an app to detect its beers on tap in venues
Tech giants' indirect emissions rose 150 percent in three years
icare signs $29m cloud renewal with AWS
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
private
private
FBI access to private data in Europe pending
The European Commission is said to be close to finalizing an agreement with the United States that would allow the FBI to see the credit card histories and internet browsing habits of European citizens.
Richard Thurston
Jul 1 2008 9:56AM
Security
HP private eyes fined US$600,000
The four private investigators involved in the HP spying scandal have been fined a total of US$600,000 by a US court..
Andrew Charlesworth
May 31 2008 4:29PM
Networking
Facebook blunder exposes photos despite private tag
A recent security lapse on Facebook which allowed access to private photo libraries highlights what can go wrong if companies use public social networking sites without security, experts warn..
Clement James
Mar 28 2008 6:49AM
Security
Preventing security breaches from inside your private network
Too often, network security relies on placing firewalls in front of public network access points and calling it a day. The assumptions are 1) being on a private network is synonymous with being on campus 2) campus users are implicitly trustworthy and 3) external threats are mitigated by the perimeter firewall.
Jan 16 2008 4:15PM
Security
Review: Multi Network Firewall 2
Mandriva's Multi Network Firewall 2 uses the open source OpenVPN and takes some of the difficulty out of using this approach. We found that the web interface helps make simple steps of creating users and user certificates, which streamlines the process immensely. We liked the organized web interface and found it easy to use.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Dec 18 2006 12:00AM
Security
Review: Nortel VPN Gateway 3050
Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ourselves looking through different guides trying to locate configuration information. The absence of a quickstart card or a getting started guide makes this task even more difficult.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Dec 1 2006 12:00AM
Security
Review: SonicWall SSL VPN 2000
Once the interfaces are configured for the network in a quick and easy setup process, the SonicWall appliance is administrated via the web interface. This interface starts with the system dashboard, which shows all system information in a user-friendly layout. The web interface organises all tasks on the left side of the screen in several tabs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Oct 1 2006 12:00AM
Security
Review: webNetwork
Although this product is easy to use, it requires a lot of configuration. The main program is set up on a server via a simple-to-use wizard. Once installed, its interface is organized with a clumsy tree menu to the left and a configuration menu on the right. The menus can be confusing and awkward to work with.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Oct 1 2006 12:00AM
Security
Review: AEP Netilla Security Platform
We found this product to be simple to set up and use. The initial configuration is done via a serial connection, using the command line. This includes choosing the device's network and name settings. Once the device has an internet provider, it can then be administrated via the web interface. The web GUI is simple and stripped down, consisting of a main tree menu on the left and a display window on the right. The menu is easy to navigate and quite intuitive.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Oct 1 2006 12:00AM
Security
Review: Caymas 318
Designed for use on the Java platform, Caymas Systems' offering in this category has a web interface called the Launchpad. This is intuitive, easy to navigate and well organised. We had no trouble at all setting up users and creating user access policies. Generally, this appliance boasts the types of features that administrators like. It is easy to set up and maintain and requires little ongoing maintenance once it is in operation.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Oct 1 2006 12:00AM
Security
Review: Aventail ST2
Setup for the Aventail ST2 is simple. You just have to configure the interface through a console connection and you can access the web-based setup wizard. This is easy to follow and guides you through the creation of the administrator account.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Oct 1 2006 12:00AM
Security
Review: Connectra
Check Point's appliance allows for both web- and network-based SSL connections via a web browser. It allows users to access information through its own, customisable web portal. The range of applications users can access include web-based applications and resources, shared files and email. The Connectra also incorporates its own intrusion prevention system, which provides extra security.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol
Oct 1 2006 12:00AM
Security
Review: Dekart Private Disk
Dekart’s approach to encryption is innovative, albeit using accepted standards where appropriate. The company offers a range of useful security-related products and utilities, within which Private Disk plays an important part.
Julian Ashbourn
Aug 9 2006 12:00AM
Security
Private eye, about to address hacker conference, arrested
FBI agents arrested a private investigator over the weekend as he was preparing to address a hacker conference in New York City, several media outlets reported today.
Dan Kaplan
Jul 24 2006 9:36PM
Security
Private D.C. suit filed against Sony
U.S. lawyers have stepped up the legal pressure against Sony-BMG Entertainment in connection with its controversial use of spyware-based Digital Rights Management software on music CDs.
William Eazel
Dec 1 2005 11:58AM
Security
Air Force CIO heading for private sector
U.S. Air Force CIO John Gilligan, who recently
oversaw a contract consolidation effort with Microsoft
to improve the Air Force's security, plans to leave for the private sector May 10.
Marcia Savage
May 3 2005 9:53PM
Security
Private webcams left unsecured on internet
Thousands of private security webcams are publicly viewable from the internet and are not being secured from cyber peeping toms and hackers, SC Magazine has learned from an investigation.
René Millman
Jan 6 2005 5:40PM
Security
Florida plugs in private Instant Messaging network
The State of Florida has launched an ambitious Instant Messaging (IM) roll out that links all of its state agencies together via a single private IM network designed to secure internal and external communications.
Robert Jaques
Sep 29 2004 11:31AM
Security
Review: SafeGuard Private Disk/SafeGuard Easy
SafeGuard Private Disk and SafeGuard Easy are well considered and professionally presented.
Julian Ashbourn
Apr 7 2004 12:00AM
Security
Virtual Private Networks (VPN): The Insecure Solution
Return on investment (ROI) will be the business term of 2002, therefore, technology-driven projects that deliver ROI will be high on the corporate agenda.
Simon Jenner
Jan 19 2004 10:21AM
Security
Previous
Most popular tech stories
Coles merges digital and customer leadership
Digital Nation announces finalists for its inaugural Digital Nation Awards
Orica to set new workforce systems live in Australia in July
Westpac pilots AI to analyse inbound call content
Westpac hires CBA's data chief to lead AI, data and digital
Australian MSP Index launched
Ingram Micro Ushers in the Age of Ultra
Announcing Pipeline 2025 tickets, theme & initial speakers
Vic gov to spend $100m on cyber security
"Waiting until an incident is in progress is too late": MSPs urged to review ransomware response as new reporting rules commence
Blackberry celebrates "giant step forward"
The three steps to industrial IoT success
How IBM aims to protect food supplies using IoT, blockchain and agritech
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Perth IoT vendor Digital Matter names new chief executive
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?