Technology

Review: Wedge 1005G Anti-malware Gateway

Review: Wedge 1005G Anti-malware Gateway

Wedge 1005G Anti-malware Gateway looks good on paper, but in reality is a little disappointing. While the initial setup was easy enough, ease-of-use issues and documentation gaps made for a frustrating deployment experience.
Peter Stephenson May 3 2013 12:16PM Security
Review: Bitdefender GravityZone

Review: Bitdefender GravityZone

This sounds a bit like one of those inflatable toys at local fairs inside of which children bounce around, or perhaps some science fiction environment that surrounds a planet. Actually, although it is neither, it has some similar characteristics.
Peter Stephenson May 3 2013 12:13PM Security
Mobile upgrade for NSW Govt agencies

Mobile upgrade for NSW Govt agencies

New shared service incoming.
Allie Coyne May 3 2013 12:09PM Hardware
Defence flags network resiliency works

Defence flags network resiliency works

To tackle cyber threats.
Ry Crozier May 3 2013 10:54AM Hardware
Tax Office to refresh web platform

Tax Office to refresh web platform

CIO flags push to digital mailboxes for communication.
Liz Tay May 3 2013 7:01AM Software
Woolworths evaluates free wifi in stores

Woolworths evaluates free wifi in stores

To support apps, data-driven retail.
Liz Tay May 3 2013 7:00AM Software
Google applies for smartwatch patent

Google applies for smartwatch patent

Double touchpads and wireless connectivity.
Juha Saarinen May 3 2013 6:59AM Hardware
Intel picks insider for CEO role

Intel picks insider for CEO role

Brian Krzanich to replace Paul Otellini.
Staff Writers May 3 2013 6:50AM Storage
Review: McAfee Move Anti-Virus

Review: McAfee Move Anti-Virus

Anti-malware today suffers from a frustrating dichotomy. First, it is, arguably, the most mature of all of the capabilities in the security practitioner's toolkit.
Peter Stephenson May 2 2013 5:42PM Security
Review: Reflex Virtualization Management Center

Review: Reflex Virtualization Management Center

This is one of those products that one would think is a no-brainer. Virtualised data centres can get very large and complicated and managing it is a challenge.
Peter Stephenson May 2 2013 5:34PM Security
Telstra mobile services go down in NSW, ACT

Telstra mobile services go down in NSW, ACT

All customers affected.
Allie Coyne May 2 2013 5:30PM Telco/ISP
Review: Symantec Critical System Protection

Review: Symantec Critical System Protection

The notion of wrappers has been with us for a long time. Back in the early days of Unix and Linux, we used wrappers to provide security to not-so-secure applications, such as telnet. Today that concept has matured and we see it popping up in modern apps. Symantec CSP is a good example. One might characterise CSP as a security wrapper for mission-critical environments. That means that if it is a crucial piece of the computing infrastructure - such as a Scada system or a medical device controller - it gets the security protection it needs.
Peter Stephenson May 2 2013 2:08PM Security
Telstra to build Victorian digital radio network

Telstra to build Victorian digital radio network

Fire authority awards contract.
Staff Writers May 2 2013 2:02PM Networking
Court finds in Kogan Mobile's favour

Court finds in Kogan Mobile's favour

ispONE must pay losses, court costs.
Allie Coyne May 2 2013 12:43PM Telco/ISP
Review: Nexpose v 5.5

Review: Nexpose v 5.5

Rapid7's Nexpose assists clients through the entire vulnerability management lifecycle - spanning discovery, vulnerability detection, risk classification, impact analysis, reporting, vulnerability verification and risk mitigation. Organisations can use it to gain insight into their security posture and IT environment.
Peter Stephenson May 2 2013 12:38PM Security
Review: GFI LanGuard 2012

Review: GFI LanGuard 2012

GFI LanGuard 2012 offers a full set of vulnerability scanning and management features. It brings together vulnerability scanning, remediation and patch management, as well as network and software auditing, all under one roof. LanGuard is software-based and can be installed on almost any Microsoft Windows machine in the enterprise environment and can scan Windows, Linux/Unix and Mac OS targets on the network.
Peter Stephenson May 2 2013 12:18PM Security
Review: Core Impact Professional

Review: Core Impact Professional

The people at Core Security are at it again. We found this version of the product to contain more automation, more wizards and more options than previous versions we have tested. For those that are unfamiliar with this tool, Core Impact is quickly becoming the standard in penetration testing and vulnerability scanning. It features many types of penetration tests, including network-based and remote host-based, as well as many other tools, including Wi-Fi network and web-based penetration tests.
Peter Stephenson May 2 2013 12:16PM Security
Review: Critical Watch FusionVM

Review: Critical Watch FusionVM

FusionVM from Critical Watch offers both vulnerability management and configuration policy auditing in either a physical or virtual appliance or as a full, cloud-based SaaS option. If the SaaS option is chosen, customers can receive external scanning without any additional hardware or software needed. If scanning internally, the customer must install an appliance that connects to the cloud service for scanning.
Peter Stephenson May 2 2013 12:14PM Security
Review: ManageEngine Security Manager Plus v5.5

Review: ManageEngine Security Manager Plus v5.5

ManageEngine Security Manager Plus (Professional Edition) is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance. With vulnerability scanning, open ports detection, patch management, Windows file/folder/registry change management and vulnerability reporting capabilities, the tool protects the network from security threats and malicious attacks.
Peter Stephenson May 2 2013 12:12PM Security
Review: NetVigilance Internal Scan - Cloud

Review: NetVigilance Internal Scan - Cloud

Internal Scan - Cloud edition from netVigilance offers a full cloud-based vulnerability scanning engine that can scan both internal and external systems for vulnerabilities and compliance. This solution is based entirely in the cloud, so there is no need for the purchase of any additional hardware. All that is required is the installation of the scanning agent on a Microsoft Windows-based machine somewhere on the internal network.
Peter Stephenson May 2 2013 12:10PM Security

Log In

  |  Forgot your password?