Cybersecurity News & Analysis | SC Media | Info Security News

Security News

CyberGuard SL3200

As firewalls go, the CyberGuard SL3200 is a monster: a huge, noisy beast with performance that matches its rugged looks. The name denotes its capacity – 3.2 gigabits of total throughput, shared among a maximum of 26 Ethernet ports. Even more notably, it is able to multiplex several interfaces into a small number of very high-capacity pipes, all secured at wire speed.
Designed for high-demand environments, the box has all the HA features you’d expect – hot-swappable fans and power supplies, as well as RAID 5 storage, with an internal layout designed for maximum airflow and heat dissipation. Fail-over between two boxes is available if you have an extended license.

RSA SureFile

RSA SureFile combines RSA’s encryption technology alongside PKWARE’s PKZIP to create an encryption product that also compresses files and folders to save space and bandwidth. Because encrypted files are generally fairly random looking, they are incompressible by hardware that may be part of a bandwidth-saving infrastructure. So, it is better to compress files before encryption, or optimize both processes within one product as RSA Security has done.

Encryption Plus Hard Disk

Encryption Plus Hard Disk encrypts entire hard disks or selected partitions. Encryption of the OS files is optional. It also offers pre-boot authentication whether or not the operating system files are encrypted.

ABSPlus

ABSPlus is probably better know in the backup and recovery market and so it will be little surprise that what we are now looking at is exactly that – and more. It is an ideal storage unit to regularly back up all laptop data. With the software supplied the device becomes the complete backup and restore, disaster recovery solution.

ServGate EdgeForce

The trouble with a better mousetrap is that it soon becomes yesterday’s model: when you build security around a growing enterprise it is well to avoid obsolescence by adapting an EdgeForce appliance with its modular specification and performance.

Paranoia2

In today’s world of CD-ROMs and high-capacity DVDs, it is easy to forget that there are other storage media which still have considerable popularity. One frequently overlooked example of this is the humble tape, which is still vital for many businesses. 
Modern tapes have extremely high capacities, and developments in fiber channel mean that recording speeds are incredibly fast. However, there is an inherent security risk – after the tape has been recorded, when the data becomes portable, and therefore at risk. This is increased if you send the tapes off site to a firestore. How can you be certain that the courier isn’t simply going to vanish with your confidential client records?

ServGate EdgeForce

The EdgeForce firewall with Performance Module 1 enabled incorporates a flexible demilitarised zone (DMZ) via a third port. This gives the ability to host public servers (email, FTP and web) from behind the firewall, and with this feature, non-authenticated access to servers behind the firewall can be granted, yet the private network itself is still completely shielded from the internet.

Astaro Security Linux

We looked at version 3.0 of this product in the virtual private network Group Test last year, and it is good to see it being evaluated as a firewall this time around. Astaro might not be a familiar name to most people, but it deserves to be if it continues to produce products such as this.

Symantec Enterprise Firewall/VPN

Symantec is a very old name in the security business, but it is not going to rest on its laurels. Its software-based Enterprise Firewall with VPN has had yet another upgrade since the last time we looked at it, and it offers quite a few new features to what was already a very powerful application. The application is also available pre-loaded on one of Symantec’s distinctive bright yellow appliances if you prefer.

Firebox SOHO 6tc

Putting a firewall in the home office should be a natural thing to do. After all, you are not only protecting your user but also the data that they will be working on, and probably holding, on their machine. This security is just as important as the security in the main office, as liability on data and business-critical information could otherwise be breached with ease. This is where a small but powerful appliance from a developer with experience in both the enterprise and SOHO markets is going to come in very handy.

Next hm-product-review in Network Security