Access "Recent Releases: Security product briefs, September 2005"
This article is part of the September 2005 issue of What's the best IT security advice you've ever received?
Fischer International's Fischer Identity Suite 2.0 provides identity management capabilities through DataForum, its provisioning, approval and compliance engine. Also included are auditing and reporting, real-time separation-of-duties enforcement, and simplified data migration and synchronization. Fischer Identity Suite 2.0 is priced between $1 and $10 per user. Tumbleweed's SecureTransport pro-tects data privacy and provides secure delivery of information across the Internet and private IP networks, and now supports file transfer protocols using SSH, HTTPS, FTPS and FSTP. Turnkey integration with Computer Associates' eTrust Siteminder SSO allows organizations to leverage existing authentication infrastructures for data access and security policy management. SecureTransport starts at $8,600 for 100 user licenses. @exb Recent Releases @exe Vericept's Vericept 7.1 provides a granular level of content protection. Version 7.1 allows admin to control and define specific monitoring environments with exception- and time-based categories, and event priority settings... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
SSL VPN: Aventail's EX-1500
A review of Aventail's EX-1500
-
Sunbelt Software's CounterSpy Enterprise 1.5 Product Review
In this product review, get the pros and cons of Sunbelt Software's CounterSpy Enterprise 1.5 features, such as antispyware scanning, centralized logging and reporting.
-
Single Sign-On
Imprivata's OneSign 2.8
-
Sizing up e-mail appliances
by Tom Bowers, Contributor
Information Security magazine tests four e-mail appliances designed to clear the way for safe messaging. Here's how they measured up.
-
Top 5 Hacker Tools: Google hacker, password cracker, WLAN detector
by Ed Skoudis, Contributor
Read about five must-have hacker tools: WikTo, a Web scanner and Google hacking tool; Paros Proxy, a Web application manipulation proxy; Cain and Abel, a password sniffer/cracker; Winfingerprint, a Windows configuration harvester; and Wellenreiter, a passive WLAN detector. Get a feel for their capabilities, and then carefully incorporate each into your assessment methodology.
-
SSL VPN: Aventail's EX-1500
-
-
Hot Pick: Aladdin Knowledge Systems' eSafe 5
Aladdin Knowledge Systems' eSafe 5
-
Recent Releases: Security product briefs, September 2005
Read about security products that launched in September 2005.
-
A Field Guide to Passive Reconnaissance and Indirect Attacks
Read a review of the security book: Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks.
-
Best Advice
In this must-read compilation, we asked security luminaries to share their anecdotes, professional wisdom and success stories.
-
Hot Pick: Aladdin Knowledge Systems' eSafe 5
-
Columns
-
Perspectives: Mergers and acquisitions open security risks
Integrating infrastructures acquired from other companies without considering security and risk first exposes enterprises to myriad problems.
-
Layer 8: Choose your risk awareness battles carefully
Read at Your Own Risk
-
Ping: Phil Zimmerman
Phil Zimmerman
-
Publisher's Note
Getting It Together
-
Perspectives: Mergers and acquisitions open security risks
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO