Stories by Mandy Andress

  • Product Review: InfoExpress tries P-to-P NAC enforcement

    InfoExpress approaches network-access control with a product that requires zero network-infrastructure changes. With the InfoExpress Dynamic NAC for Windows product, policies are controlled from a central policy management server, but enforcement is handled by distributed agents residing on trusted systems, called Enforcers.

  • Symantec is a top NAC ticket

    Symantec Network Access Control (SNAC) evolved from endpoint-security technology the company picked up from its 2005 acquisition of Sygate. In our evaluation, there was no silver bullet that put Symantec on the top of the heap. Rather it edged out the competition for its breadth of coverage in the areas of deployment options, endpoint assessments and flexible policy creation.

  • NAC Appliance hits on basic enforcement

    Cisco's NAC Appliance 4.1 (formerly called Cisco Clean Access) provides basic network-access-control functionality, such as antivirus and patch-status checks, but remains behind many of the other vendors in this space because of the inability to perform assessment checks beyond initial connection.

  • Watching carefully for signs of an attack

    The power and complexity of NetIQ’s Security Manager 5.0 — the latest version of the company’s security event management product — is well masked by its consistent user interface and overall ease of use.

  • Be prepared

    With network attacks increasing, companies are more interested in understanding what types of attacks are being launched against their networks and being alerted when they occur.

  • Linux firewalls

    When looking for an effective, inexpensive firewall solution, Linux firewalls do not often enter into the picture unless someone involved in the security planning process is a Linux guru.

  • Remote controllers

    Providing secure remote access to the corporate network is the Holy Grail for many organisations. Although remote access is necessary for many employees to do their jobs, the security implications are enormous and must be adequately addressed. VPN solutions are one of the more popular methods used to provide remote access, but enforcing security on the end-user's system has been problematic.

  • The astute observer

    As WLANS (wireless local area networks) continue to be deployed throughout the enterprise, administrators need tools to help them audit wireless network installations, analyse performance, and identify security issues.

  • Quick, secure access

    Providing remote access to partners and employees is necessary in today's distributed business environment. Employees want to work from home or at least have access to their e-mail accounts when travelling. For the sales team partners, access to customer databases or inventory levels is critical. To date, however, setting up secure, easy-to-use remote access has proved complex, costly and unreliable.

  • Antivirus software, from A to V

    Once the responsibility of only the most ardent technophiles, antivirus technology now holds a prominent slot on most enterprises' priority lists. But with so many products on the market, which antivirus solution should you invest in?

  • Free, dependable IDS

    Historically, any enterprise search for a host-based IDS (intrusion-detection system) to protect its Linux environment has found itself stymied by a lack of available solutions.

  • A little mobile security

    Many organisations are deploying VPNs to secure remote access or to protect wireless networks, and handheld devices should not be excluded from these security measures.

  • Data protection for PDAs

    As more Pocket PC devices are plugged into the corporate network, companies should take security measures to ensure that any sensitive data on such devices is encrypted.

  • Security policy in a box

    Developing an effective security policy is the first and perhaps most critical step to safeguarding your network against intruders and gaining the trust of online consumers.