Security » Reviews »

  • Email encryption has gotten so much better, so you'd be crazy not to use it

    I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.

  • Security suites: Choosing the best one for you

    The old days of straightforward antivirus software packages are gone -- victim of a changing threat scene in which the dangers are more complex than ever and come from multiple sources.

  • Review: Norton Security -- simpler and still a winner

    Once upon a time, Symantec's brand of Norton security software had one of the most confusing lineups around -- products included Norton 360, <a href="http://www.computerworld.com/article/2488677/application-security/7-all-in-one-security-suites-anti-malware-for-all-your-devices.html?nsdr=true&amp;page=5">Norton 360 Multi-Device</a>, Norton Anti-Virus and Norton Internet Security. Trying to decide which product was the best for you -- not to mention the best priced -- was no picnic.

  • Review: McAfee LiveSafe offers top Windows, Android protection

    McAfee LiveSafe is the best product in McAfee's sizable security portfolio. Its suite offers protection for an unlimited number of Windows PCs, Macs and Android and iOS devices, along with a Web dashboard. There's 1TB of cloud-based storage as well. The whole thing is available for $60 per year.

  • Review: BitTorrent delivers cloud-free 'Dropbox for business'

    BitTorrent originated as a file sharing and distributed download technology, powering downloads of content both legitimate (such as Linux ISOs) and not (Taylor Swift albums).

  • Hawkeye G battles malware so you don't have to

    The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.

  • Six browser plug-ins that protect your privacy

    It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, <em>something</em> has to pay for all the free programming and services.

  • Sync, store and share data with Transporter Sync

    The scoop: Transporter Sync, by Connected Data, about $100 (plus cost of external storage drive)

  • Tails 1.0: A bootable Linux distro that protects your privacy

    Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.

  • Review: FireEye fights off multi-stage malware

    You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.

  • Unisys unveils invisibility cloak for network traffic

    If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

  • AirMagnet breaks new ground in wireless spectrum analysis

    Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.

  • Averail Access aces mobility management test

    Enterprise mobility management (EMM) can encompass a broad range of functions, from managing mobile devices, to applications, expenses, personnel, and policies. But perhaps the most important aspect is mobile information/data/content management, tracking the distribution and usage of sensitive organizational data, as well as ensuring appropriate security and policy compliance.

  • Review: PowerCloud delivers Wi-Fi access point and cloud-based management for small business

    PowerCloud Systems has released a cloud-based Wi-Fi solution that fills the gaps between residential products that lack management and features, and enterprise systems that can be overkill in smaller organizations.

  • Review: Box beats Dropbox - and all the rest - for business

    Box trumps Dropbox, Egnyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting, and enterprise integration

  • Smart card readers for the iPhone and iPad

    Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device

  • Super-fast Wi-Fi: Cisco, Ubiquiti access points top out at nearly 400Mbps

    Earlier this year we tested several consumer-level 802.11ac routers. Here, we take a look at two enterprise-level access points. They're a part of the so-called "Wave 1" phase of the 802.11ac standard: both access points support up to three spatial streams and 80 MHz wide channels, offering theoretical data rates up to 1.3Gbps. But just as we saw with the 802.11ac routers, you won't get throughput rates nearly that fast.

  • Best tools for protecting passwords

    For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

  • What to look for when evaluating password manager software

    Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

  • What is a vulnerability?

    Judging by initial appearances, our security testing turned up a ton of vulnerabilities – nearly 150 of them. In reality, however, none represented actual issues in the Huawei switch.