Location, Location, Location ...

...is more than just a weak punch line to a stale real estate joke. It's the critical element missing from most wireless security tools, says Brian Wangerien, director of product management at Boston-based Newbury Networks Inc. His company's WiFi Watchdog technology fixes on the location of wireless users to help determine their access rights. "Authentication and encryption alone are like a steel door on a grass hut," Wangerien quips. By adding location information, he says, IT will know whether someone trying to reach an application server is a worker popping onto the corporate LAN from the cafeteria or a "war chalker" sneaking on from outside the building. WiFi Watchdog can also be used to track down the location of uninvited network visitors, which Wangerien says the U.S. Air Force has done on more than one occasion at an undisclosed air base. Version 5.0 of the tool is expected to be ready in September, he says. New features include a graphical view of threat conditions and prebuilt reports for regulatory-compliance audits. In addition, WiFi Watchdog 5.0 can automatically stop more than 100 threat signatures. Pricing starts at $14,995.

Business continuity for e-mail option...

...available with messaging security service. Electric Mail Co. in Burnaby, British Columbia, offers a fallback plan for users of its PerimeterProtect service in case your Exchange server keels over or (heaven forbid) your whole building keels over in one of this summer's hurricanes. Users with Electric Mail accounts can rely on the antivirus and antispam service as a backup e-mail tool. According to Ian McDonald, the company's general manager, users can access Electric Mail's service via a browser during an Exchange outage, but their messages are sent using their company's own domain address. He says that's better than contacting business partners and customers with unrelated Hotmail or Yahoo accounts, as many users now do in emergencies. McDonald says that by year's end, Electric Mail plans to add full capabilities for searching the messages it stores. Monthly pricing for the service can be as low as $3 per user.

Snooping on yourrivals? Looking to...

...acquire an unsuspecting company? Well, your end users might consider disguising who they are as they mouse around the Web, says Lee Itzhaki, director of product management at Anonymizer Inc. The San Diego-based company offers a service that protects the identity of Web surfers. While some may use the sly service to visit porn sites anonymously, businesses employ it to protect their corporate identities while doing everyday competitive analysis. Itzhaki says your browser is chock-full of information about you and your system, so companies can detect where you're from and then deliver phony Web pages to your machine - as he claims happened when one airline was researching a rival's fare structure. U.S. intelligence agencies use Anonymizer to scour terrorist Web sites for threat information while making it appear as if they're surfing from countries with known anti-U.S. constituencies, he says. Anonymizer supports only Windows systems now but expects to add Macintosh support late this year or early in 2006.

Lane Bess, president of Trend Micro North America
1pixclear.gif
Lane Bess, president of Trend Micro North America
1pixclear.gif
Trend Micro attacks spyware on...

...consumer PCs. So who cares? You do, because the capabilities that Trend Micro Inc. deploys for home users with this week's release of its Anti-Spyware 3.0 software will be integrated into its central gateway product later this year, says Lane Bess, president of Trend Micro North America in Cupertino, Calif. The $29.95 consumer version probes 150 components of a user's PC to determine whether malware has, for example, changed browser settings or modified host files. Bess also points to the upgraded antispyware tool's need for 60% less RAM than earlier versions did, claiming that the reduction results in 75% faster loading times. He notes that spyware eradication efforts don't get the same cooperation among vendors that antivirus work does. "The industry is evolving, and it's a little too soon for the open trading of files" among competitors, Bess says.

Keep an eye on your network...

...with Eye of the Storm, network management software from Entuity Inc. in New York. Version 4.0 of the network performance management, fault-detection and inventory-analysis tool ships next week and adds voice-over-IP management features, such as performance and availability testing and voice-quality reporting. Entuity's software integrates with CallManager, Cisco Systems Inc.'s VoIP call-processing software. Eye 4.0, as the product is known for short, also adds an "open modeling framework," says Michael Jannery, vice president of marketing at Entuity. Pricing starts at $50,000.

5 ways to make Windows 10 act like Windows 7
  
Shop Tech Products at Amazon