July 2010
The death of Windows XP Service Pack (SP) 2 is set for this month, but many IT administrators appear to be in denial.
Cyberthreats are driven by the big money behind organized cybercrime, but increased automation is being driven by the American Recovery and Reinvestment Act of 2009 ...
I am still amazed by the number of organizations that still don't have all of the right people working toward a singular goal of compliance ...
What legal matters must you bear in mind when a cybercrime strikes your company? Larry Jaffe reports.
State-sponsored cybercrime is a touchy subject for law enforcement because of the political complications that can result, reports Matthew Heller.
As cybercrime continues to intensify and regulatory compliance mandates continue showing signs of becoming even more demanding for organizations, we take a look at the ...
Has the time come to take retaliatory action against digital attacks? And if so, where is the line drawn? Deb Radcliff reports.
One weak link in the global supply chain could result in malware being installed on a widely deployed product, reports Angela Moscaritolo.
Adoption of virtualization is continuing - with caveats, says Guy Buzzelli, CIO of Delray Beach, Fla. Dan Kaplan reports.
Social networks must be adopted in the enterprise...with precautions, says Rick Tracy.
The Astaro Security Gateway provides a comprehensive set of protection features.
The Check Point UTM-1 comes fully loaded with firewall, intrusion prevention, anti-virus, anti-spyware, URL filtering, web security and anti-spam.
Combines multiple security components, including intrusion prevision system, stateful-inspection firewall, anti-malware, anti-virus, anti-spam, web filtering, IPsec, SSL VPN, WAN optimization and SSL inspection.
The GateProtect GPZ 2500 is a highly flexible, highly configurable full-function UTM appliance.
The U120 from NETASQ includes a firewall, HTTP proxy with URL filtering, and an anti-spam engine.
This UTM product combines a stateful packet inspection firewall, IPS, SSL VPN, IPsec VPN, anti-malware, anti-spam and web URL filtering, as well as controls to ...
The Panda GateDefender Integra is comprised of a firewall, an IPS, a VPN, a signature- and heuristic-based anti-malware engine, a content and web filter, and ...
The SonicWALL E-Class Network Security Appliance is a high performance, highly configurable, super UTM.
The aXsGUARD from Vasco takes the traditional UTM focus and adds strong authentication capabilities for improved security.
The ZyXEL USG 1000 provides basic UTM functions – such as a firewall, intrusion detection and prevention engine, anti-virus, web content filter and anti-spam – ...
McAfee Total Protection for Endpoint is a host-based endpoint solution that protects laptops, desktops and server machines from various security threats.
Panda Security for Business is a software-based solution which offers endpoint security protection for desktops and servers.
Sophos Endpoint Security and Data Protection is a software solution designed to protect endpoints from various host- and network-based threats, as well as data leakage ...
Symantec Endpoint Protection combines many Symantec protection technologies into a single, agent-based suite for desktops, servers and mobile devices.
Enterprise Security for Endpoints is software solution comprised of Trend Micro’s OfficeScan suite of modules, as well as a series of plug-ins, which customers can ...
StormShield is an endpoint security software solution consisting of a backend management server and client agents.
A fully automated workflow system that performs exactly the way a person would in a manual vulnerability remediation process.