Access Control News, Features, and Interviews

News

More Access Control news

Reviews

Check Point and Sygate corral end points

At their core, Check Point Integrity and Sygate Enterprise Protection are effectively policy-based firewalls. That's the cake. The icing is their capability to monitor other applications for compliance with configuration requirements and send errant machines to quarantine until they can be updated with the latest anti-virus definitions, Windows patches, or other necessities.

Victor Garza | 28 Dec | Read more

More Access Control reviews

Slideshows

More Access Control slideshows

Features

Cloud Computing Poses Control Issues for IT

Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.

Kevin Fogarty | 18 May | Read more

How security professionals monitor their kids

Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going?

Joan Goodchild | 15 Apr | Read more

What Are the Most Overrated Security Technologies?

The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?

Bill Brenner | 25 Mar | Read more

Biometrics: What, Where and Why

Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.

Mary Brandel | 25 Mar | Read more

More Access Control features

Tutorials

Ten tips to secure client VPNs

If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.

Martin Heller | 03 Oct | Read more

More Access Control tutorials

Guides

Workarounds: 5 ways employees try to access restricted sites

There may have been a time when blocking certain sites was acceptable in most office environments. But what was once considered off-limits is now essential in many organizations. Social media sites like Facebook are a major part of many companies' marketing strategy. Sites like YouTube present opportunities to share information about products or services visually. And IM and chat services like G-chat are free and efficient ways for employees to communicate.

Joan Goodchild | 12 Aug | Read more

More Access Control guides

Opinions

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

Do you have an Insider Threat Program?

Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.

David Gee | 01 Apr | Read more

Best ways to protect Ecommerce site from cyber criminals

With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.

Joy Mali | 20 Mar | Read more

More Access Control opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place