Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT

Home | News | Insight | How-tos | Case studies | Interviews | Briefings | Reviews | Blog

Topic: Security software





Security software News

19 February 2009

Microsoft axes Google Docs rival

By Nancy Gohring, IDG news service

Microsoft is discontinuing its Equipt package of software and services, only eight months after launching it. Read more...

Security software Blog Entries

14 December 2008

The FTC wakes up to scareware

By John E. Dunn, Techworld

Finally, the authorities are getting tough with the sellers of bogus security software, a phenomenon known as ‘scareware'. Read more...

Security software Insight

20 July 2008

Spotting weak security staff

By Lisa Vaas, Computerworld (US)

Are your security staffers are trustworthy? Competent? Knowledgeable? Ask a security professional for horror stories and you might think again. Read more...

Security software Briefings

29 August 2007

Making sure of VoIP security

By Tim Greene, Network World

There are new ways to hack VoIP, but strict vigilance can defeat them. Read more...

Security software Interviews

25 June 2008

Security's virtual badlands

By Bryan Betts, Techworld

We hear from Sourcefire CTO Martin Roesch why virtualisation is still Terra Incognita for network security technologists - and why he believes his company is worth more its rivals and the stock market seem to think. Read more...

  • Advertisement

Security software Whitepapers

21 September 2007

Enhancing Performance with Disk Defragmentation

By Diskeeper

The approach of this report is to display the improvement in antivirus and anti-spyware utility scan times (speed) before and after defragmentation using Diskeeper 2007. Read more...

Security software Product Reviews

26 February 2007

Yoggie Gatekeeper Pro

By John E. Dunn, Techworld

  • List price: $220 (+ $40 annual subscription after year 1)
  • Pros: Puts lots of security functions into one device; Updates regularly; Offloads work from laptop; Can be used with policy server
  • Cons: Most security is pre-configured; Doesn’t protect against rogue Wi-Fi hotspots Read more...

Security software How-Tos

12 October 2005

Ten steps to secure networking

By Pamela Warren, Nortel

Don't just defend the perimeter of your network, protect the whole infrastructure. Here's some tips on how - plus how to detect, prevent and respond to breaches when they do occur. Read more...

Security software Case Studies

16 March 2007

Virtualisation reality check

By Robert Mullins, IDG News Service

Mike Williams considered his virtualisation project a success after consolidating 17 US data centres into three. But then the traffic jams started. Read more...

  • Advertisement

WHITE PAPERS

Techworld topic pages