Latest News
State of Security 2025: Cyber Resilience
NAB makes cuts to technology and enterprise operations division
Cyber Security Roadshow: Digital As Usual 2025
Grant Thornton consolidates 60TB of Microsoft 365 data into Veeam
Veterans' Affairs trials AI-enabled search
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
risk management
risk management
Review: Fischer International Fischer Identity v5.0
The Fischer solution is postured to help organizations drive (not react to) their identity management solutions.
Peter Stephenson
Oct 4 2012 2:25PM
Security
Review: Code Green Networks CI-750 Content Inspection Appliance v8.0
The CI-750 provides real-time content inspection allowing customers to protect against data loss across the network.
Peter Stephenson
Oct 4 2012 2:22PM
Security
Review: Centrify Suite 2012
Centrify Suite 2012 provides user provisioning and access control across the enterprise.
Peter Stephenson
Oct 4 2012 2:19PM
Security
Review: Bradford Networks Network Sentry v6.0
Network Sentry provides centrally managed access to the network, integrates with user management applications, such as Microsoft Active Directory, and may use agents or remain agentless.
Peter Stephenson
Oct 4 2012 1:51PM
Security
Review: Avatier Identity and Access Risk Management Suite v9.0
Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs.
Peter Stephenson
Oct 4 2012 1:47PM
Security
Review: Arkoon Network Security StormShield v6.x
StormShield is designed to enhance endpoint security through user control, system level security, data protection and network connectivity.
Peter Stephenson
Aug 9 2012 9:44AM
Security
Review: Novell Endpoint Protection Suite
The Novell Endpoint Protection Suite features two modules from the much larger ZENworks Suite of products.
Staff Writers
Aug 9 2012 9:35AM
Security
Review: McAfee Total Protection for Endpoint
Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise and ensure that policy compliance is met across the board.
Peter Stephenson
Aug 9 2012 9:32AM
Security
Review: ESET Endpoint Security
Endpoint Security from ESET focuses on malware prevention and overall system security to mitigate threats throughout the enterprise.
Peter Stephenson
Aug 9 2012 9:25AM
Security
Review: NIKSUN NetDetector Alpine
NetDetector Alpine v4.2 is the most up-to-date version of NIKSUN's network traffic-monitoring hardware that audits and informs users of network security threats.
Staff Writers
Aug 1 2012 2:36PM
Security
Review: SolarWinds Network Configuration Manager
The SolarWinds Network Configuration Manager offers the ability to check all network devices, including routers, switches and firewalls, throughout the network environment against compliance and policy templates.
Peter Stephenson
Aug 1 2012 2:00PM
Security
Review: NetIQ Secure Configuration Manager
The Secure Configuration Manager from NetIQ offers a full systems and configuration management platform to manage both risk and policy across many network assets.
Peter Stephenson
Aug 1 2012 11:51AM
Security
Review: Lumension Risk Manager
Lumension Risk Manager is a piece of a larger suite called the Lumension Compliance and IT Risk Management platform.
Peter Stephenson
Aug 1 2012 11:49AM
Security
Review: FireMon Security Manager with Policy Planner and Risk Analyzer
The FireMon Security Manager with Policy Manager and Risk Analyzer is the ultimate policy and risk management tool.
John
Aug 1 2012 11:46AM
Security
Review: Skybox Security Skybox View Enterprise Suite v6.0
The Skybox View Enterprise Suite is a set of tools for firewall management, network compliance assessment, and risk and vulnerability management.
Peter Stephenson
Aug 1 2012 11:44AM
Security
Review: Rsam eGRC Platform v7.5
The Rsam Enterprise GRC platform is a fully integrated, modularized platform supporting full GRC or individual module deployments.
Peter Stephenson
Aug 1 2012 11:40AM
Security
Review: RSA Archer eGRC Suite, RSA Archer eGRC Platform v5.1.4
RSA Archer Risk Management enables users to proactively address risks to reputation, finances, operations and IT infrastructure as part of a governance, risk management and compliance (GRC) program.
Peter Stephenson
Aug 1 2012 11:37AM
Security
Review: RedSeal Networks RedSeal v5.0
RedSeal v5.0 provides the intelligence necessary to proactively improve defenses, maintain continuous compliance and mitigate real-world risks by identifying all the available pathways of access and exposed vulnerabilities present across a network.
Peter Stephenson
Aug 1 2012 11:34AM
Security
Review: Modulo Risk Manager v7.6
Modulo Risk Manager is a single, fully integrated platform for organizations to automate and unify their IT governance, risk and compliance (GRC) processes.
Peter Stephenson
Aug 1 2012 11:31AM
Security
Review: MetricStream Risk Management Solution v6.0
MetricStream Risk Management Solution enables organizations to identify, assess, quantify, monitor and manage their enterprise, operational and IT risks through an assessment-driven offering.
Peter Stephenson
Aug 1 2012 11:24AM
Security
Previous
Next
Most popular tech stories
NSW Education turns to Deloitte for HCM program delivery
Lion migrates staff onboarding process from SAP into ServiceNow
State of MarTech
David Jones invites all parts of its business to embrace data
mecwacare sizes its digital transformation
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Photos: Australian industry explores data for net zero
UTS launches Australian Artificial Intelligence Institute
Australian firm wins global Cisco AI award for rail safety solution
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?