Select the directory option from the above "Directory" header!

Security: Features

Features
  • Security ripe for outsourcing?

    Security demands for online applications such as e-commerce and Web services are prompting more corporate customers to hand off security functions - such as intrusion detection and firewalls - to outside service providers.

  • Partners in crime prevention

    Ever noticed how stressed network administrators are? If it wasn't enough to expect them to keep the company LAN running efficiently, they also have to keep an ever more diverse range of Web-based bugs, spies, viruses, phishes, key loggers, snoopers, spammers, hackers and general mayhem makers at bay.

  • Windows XP's big fix

    It's an unsafe world out there for Windows-based computers. Microsoft wants to address the problem with its new megapatch, Service Pack 2 for Windows XP. Does it succeed? Not entirely. But the big fix does so much to close security holes and to make protecting your PC simpler that it's still an essential upgrade.

  • Spyware sneaks into the office

    Bruce Edwards began to understand that spyware was more than a consumer PC problem when his users started complaining loudly about poor performance and an increase in pop-up ads. But it wasn’t until after he’d checked all of his organisation’s PCs that Edwards understood the full scope of the problem.

  • The right blend

    In a world of multiple threats, resellers can help companies secure the fort by offering a holistic security approach.

  • Slammer: One year later

    Cash machines froze. Airlines and hospitals dusted off paper forms to schedule reservations and track patients. This was the scene on Jan. 25, 2003, shortly after the Slammer worm appeared and quickly began spreading around the world, flooding computer networks with worm-generated traffic and knocking vital database servers offline.

  • The Future of Firewalls

    Firewall technology has evolved significantly since the days of basic packet filters and network address translation. We now have not just firewalls but “intrusion detection devices”, which do far more complex things to the traffic they see in an attempt to prevent the network from being attacked. So where are firewalls going?

  • Plugging storage security holes

    Storage systems weren’t designed with security in mind. They started out as direct-attached, so if the host was secure, the storage was too. That’s all changed.

  • Security breakdown

    The news isn’t good. Security breaches and worm, virus and Trojan attacks are all soaring. And the bottom line is remarkably simple — no business is safe unless the correct security policies and technologies are in place. Sarah Stokely breaks down the grim truths revealed in the 2003 Australian Computer Crime and Security survey and looks at some remedies.

  • The IPS question

    Security customers aren’t the only ones debating whether intrusion detection systems (IDS) can deliver on their promises of preventative security — IDS vendors are also trying to figure out how to deal with a technology that threatens the core of their business strategy.

  • Hot stuff: Securing firewalls

    Consumers are showing a preference for buying security solutions pre-configured on a variety of hardware appliances. Helen Yeatman investigates the driving force behind this increasing trend.

  • SECURITY: Cashing in on security

    Even in times of economic hardship there are some industries that continue to boom out of necessity. IT security is one of them. But what does the channel need to know to make money out of security?