Technology

Review: NetIQ Identity Manager

Review: NetIQ Identity Manager

Identity Manager from NetIQ is a full identity and user management platform that allows administrators to manage users across physical, virtual and cloud-based environments.
Peter Stephenson Oct 4 2012 2:36PM Security
Review: Hitachi ID Systems Hitachi ID Management Suite v8.0

Review: Hitachi ID Systems Hitachi ID Management Suite v8.0

The Hitachi ID Management Suite is primarily made up of three modules: Hitachi ID Identity Manager, which helps manage identities and provisioning across multiple systems and applications; Hitachi ID Password Manager; and Hitachi ID Privileged Access Manager.
Peter Stephenson Oct 4 2012 2:33PM Security
Review: ForeScout Technologies ForeScout CounterACT v7.0

Review: ForeScout Technologies ForeScout CounterACT v7.0

ForeScout CounterACT offers an enterprise-class NAC, assuring network access based on real-time endpoint classification configuration assessment, user and endpoint compliance policy and automated response.
Peter Stephenson Oct 4 2012 2:29PM Security
Review: Fischer International Fischer Identity v5.0

Review: Fischer International Fischer Identity v5.0

The Fischer solution is postured to help organizations drive (not react to) their identity management solutions.
Peter Stephenson Oct 4 2012 2:25PM Security
Review: Code Green Networks CI-750 Content Inspection Appliance v8.0

Review: Code Green Networks CI-750 Content Inspection Appliance v8.0

The CI-750 provides real-time content inspection allowing customers to protect against data loss across the network.
Peter Stephenson Oct 4 2012 2:22PM Security
Review: Centrify Suite 2012

Review: Centrify Suite 2012

Centrify Suite 2012 provides user provisioning and access control across the enterprise.
Peter Stephenson Oct 4 2012 2:19PM Security
Review: Bradford Networks Network Sentry v6.0

Review: Bradford Networks Network Sentry v6.0

Network Sentry provides centrally managed access to the network, integrates with user management applications, such as Microsoft Active Directory, and may use agents or remain agentless.
Peter Stephenson Oct 4 2012 1:51PM Security
Review: Avatier Identity and Access Risk Management Suite v9.0

Review: Avatier Identity and Access Risk Management Suite v9.0

Avatier's Identity and Access Risk Management Suite provides user creation, authentication, provisioning, and deprovisioning of user IDs.
Peter Stephenson Oct 4 2012 1:47PM Security
ANZ rolls out new customer-facing tech

ANZ rolls out new customer-facing tech

Trials NFC again in $1.5 billion program.
James Hutchinson Oct 4 2012 12:46PM Financial Services
Sydney Uni pilots app store for BYO machines

Sydney Uni pilots app store for BYO machines

Budget grows for network upgrade.
Liz Tay Oct 4 2012 12:00PM Networking
RIM offers cash rebate for BlackBerry 7 upgrades

RIM offers cash rebate for BlackBerry 7 upgrades

Businesses enticed to trade in old phones.
Chris Jager Oct 4 2012 10:45AM Hardware
US bank site hackers used advanced botnets

US bank site hackers used advanced botnets

Largest banks targeted.
Joseph Menn Oct 4 2012 6:38AM Security
Tabcorp moves apps to services layer

Tabcorp moves apps to services layer

Looks to educate regulator on private cloud.
Liz Tay Oct 4 2012 6:30AM Software
Hackers exploit outdated Wagamama site

Hackers exploit outdated Wagamama site

Restaurant chain serves up malware.
Darren Pauli Oct 4 2012 6:30AM Security
Rio Tinto to automate Argyle underground mine

Rio Tinto to automate Argyle underground mine

Brings system from east to west.
Ry Crozier Oct 4 2012 6:30AM Hardware
Trans-tasman telcos push back on regulation

Trans-tasman telcos push back on regulation

No market problem?
James Hutchinson Oct 4 2012 6:30AM Telco/ISP
US authorities bust Microsoft support scam

US authorities bust Microsoft support scam

Freeze thousands in assets, seize domains and block phone numbers.
Darren Pauli Oct 4 2012 5:27AM Security
After major bust, Australia dubbed a 'testing ground' for phone security scams

After major bust, Australia dubbed a 'testing ground' for phone security scams

Authorities freeze thousands of dollars in assets, seize domains and block phone numbers.
Darren Pauli Oct 4 2012 2:50AM Security
Fisheries revamps 'Tier 3' IT strategy

Fisheries revamps 'Tier 3' IT strategy

Tightens security, consolidates telco contracts.
John Hilvert Oct 3 2012 2:31PM Strategy
Telstra tussles over greenfield duct standards

Telstra tussles over greenfield duct standards

Wants developers to maintain pit and pipe.
James Hutchinson Oct 3 2012 2:05PM Telco/ISP

Log In

  |  Forgot your password?