Select the directory option from the above "Directory" header!

Security: Features

Features
  • The enemy within

    Enforcing security policies, installing authentication and the all-in-one appliance are proving hot buttons in the security market. JENNIFER O'BRIEN reports.

  • All-in-one security devices face challenges

    The multipurpose security appliances that consolidate firewall/VPN, content filtering, intrusion prevention and more into a single box are winning favor as easy-to-manage devices. But the open secret about these unified threat management devices is that they take a bite out of bandwidth as they inspect content.

  • Sorting the security standards

    Many companies are using standards and frameworks to deal with certain aspects of information security. These models can help protect systems and data, but each plays a very different role in an overall security plan.

  • Balancing Risk

    Natural disasters, market pressures and increased regulatory oversight are driving organizations toward a state of greater risk awareness than ever before.

  • Monitoring Surveillance opportunities

    Mitigating the risk of terrorism and other potential dangers on critical infrastructure is becoming increasingly important. In fact, it's a life or death situation for many companies at risk of losing the farm.

  • The buzz about fuzzers

    Writing perfect secure code is hard. Daniel J. Bernstein has probably come the closest to it in practical, publicly released software. With his almost maniacal drive for security perfection, he has written multitudes of software that remain unbroken.

  • Questions surround smartphone security

    Wireless vendors are rolling out a new generation of handheld computers called smartphones for corporate users, but many network executives say they won't consider them until the means to manage and secure them are clear.

  • Are firewalls expendable?

    The firewall's fate is up for debate. For more than a decade, firewalls have stood guard at the perimeter of corporate networks to defend against Internet perils. But a growing number of security managers, united under the banner of the Jericho Forum, want to retire this stalwart because they say it hinders e-commerce.

  • Web filtering tools handle ever-larger jobs

    From the time the World Wide Web took off in the mid-90s, companies began looking for ways to filter out access to its more lurid displays, but IT managers who use filters today say they're good for much more than blocking access to porn.

  • Fake chips on the march

    Although chip makers have developed better strategies to combat counterfeiting, the absence of strong intellectual-property laws in emerging markets such as China means that the days of counterfeit chips are not over, according to industry experts.

  • Behind Bars: Securing your mobile parts

    With mobile computing becoming a growing part of the corporate and government mix, security concerns are raising many people's blood pressure. But what security functionality is available on the latest gear?

  • Eye-Spy

    From iris scanners to fingerprint readers and hand geometry, biometric technology promises to help alleviate identity theft, improve access control and keep the bad guys at bay. So what's taking it so long to get here, and why aren't more people excited? JENNIFER O'BRIEN reports.

  • Eye-dentify yourself

    Understanding a user's identity - their role and relationship to a company - is daunting. But it is a necessary evil that allows businesses to ensure only authorised users have access to the right resources at the right time.

  • Adding value to security

    IT has been a good year for the major security software vendors with most of the majors reporting big increases in income and turnover. Among them Symantec posted a 48 per cent increase in global revenue for the first quarter of the year while Trend Micro's second quarter revenue was up 30 per cent and net income increased 144 per cent year-on-year.

  • The push for better authentication services

    Responding to a scourge of online fraud and identity theft that threatens to undermine public confidence in Internet commerce, major companies are rolling out new services to encourage the adoption of better technology to identify customers, business partners and employees online.

  • Online fraud: We got law, but no enforcement

    Plenty of laws exist to prosecute online identity thieves and fraudsters, and also to co-opt Internet Service Providers (ISPs) and online auction sites into the fight against fraud, but enforcement is lacking across the board, according to security experts.