Issue OverviewInformation Security magazine - May 2006
General Motors and its Chief Architect of Identity Management, Jarrod Jasper, reduced user profiles from 40 to one. Get tips on how they did it. Plus, find out more about PCI 101, how the credit card association believes how it can help reduce credit card fraud and why organizations well welcome the clear directives involved. We also analyze seven of the top antispyware products and find out how they stack up for protecting corporate desktops. Access >>>
Premium Content for Free.
Hot Pick: Q1 Labs QRadar 5.0
Q1 Labs QRadar 5.0
Network Access Control: Endforce's Enterprise 2.5
Endforce's Enterprise 2.5
Insecure.org's Nmap 4.01
PRODUCT REVIEW We take a close look at seven antispyware products. Can they keep your corporate desktops free of prying eyes?
Is Microsoft Trustworthy Yet?
PLATFORM SECURITY The fourth anniversary of its Trustworthy Computing Initiative is marked with mixed reviews from users.
Sendmail Sentrion GP product review
Product review of open source Sendmail Sentrion GP, which can build on software to enhance email security with antivirus, antispam and policy interface.
- Hot Pick: Q1 Labs QRadar 5.0
IDENTITY MANAGEMENT GM's Jarrod Jasper drives a common user profile across all systems.
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
INDUSTRY COMPLIANCE With the goal of reducing fraud, the credit card associations' PCI standard scores points for clarity.
TippingPoint/3Com's TippingPoint X505 product review
In this product review, get info on TippingPoint/3Com's TippingPoint X505 intrusion prevention security tool. Learn about product cost, installation, setup and configuration features.
BITS & BOLTS Microsoft's .NET development framework can help your Web apps perform securely.
- Reborn Identity
Editor's Desk: Show me the money
Layer 8: In security, leadership comes first
Perspectives: Security issues are similar worldwide
Security managers are concerned about the same things worldwide: Managing risk more effectively, making management care about security, and what to do about end users.
- Editor's Desk: Show me the money
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...