Sept 08
Gary McKinnon allegedly entered U.S. government systems he shouldn't have and caused thousands of dollars in damage. For this, he should be held accountable in ...
Are current AV solutions enough to protect end-users?
Companies are learning that it's not enough to patrol their information technology systems for potential threats from thieves, hackers and saboteurs.
By Nov. 1, creditors must comply with Federal Red Flag rules designed to combat identity fraud.
E-commerce is not only attracting online consumers, it's increasingly attracting cybercriminals.
Enterprises must protect corporate data while ensuring privacy, reports Chuck Miller.
Protecting users from internet-borne threats falls on trusted websites, says Overstock's Sam Peterson. Dan Kaplan reports.
Portable media devices are being used to lift corporate data, but there are tools to defend against this practice, reports Deb Radcliff.
The information security models at higher education verge from those at corporations, says Dennis Devlin.
Technical support for the management solution comes down to the individual.
An offering of multiple utilities tied into one package.
Bit9 Parity is a software tool in the class of endpoint protection devices, which use whitelisting of files to secure the endpoint.
Provides control of removable devices and peripherals from laptops and desktops.
CynapsPro Suite 2008's management console provides an across-the-board policy and rule definition and management ability.
Blink works like a host-based IPS (HIPS) system by trying to stop malware from ever making it to the endpoint.
A component of the more robust GuardianEdge Data Protection Platform that includes the GuardianEdge Device Control Auditor utility.
ZENworks ESM can perform user and systems management by using either Microsoft Active Directory, Novell eDirectory or any combination.
This suite fits in the category of network traffic protection. It also uses a tiered architecture, which seems very confusing at first, but becomes easier ...
This tool detects and allows restriction of devices by device type, model or even specific device serial number.
StormShield Security Suite offers integrated system and data protection in a single product.
This product is a group of protection mechanisms bundled into one application, which includes the popular Symantec Anti-Virus and the Network Access Control client as ...
OfficeScan Client/Server Edition is a well-rounded network security product for the network endpoints.
The Sophos Endpoint Security and Control is a subset of the Sophos Network Access Control Advanced.
EndPointSecurity installs a small footprint agent on the machine. At only 1.2 MB in size running in the background, this is the smallest of the ...
The management interface for these products enables applications, users, groups, devices and just about anything else in the enterprise to be selected, detailed audits to ...
The V-Pass FX is a small fingerprint scanner that provides a way to control physical access to facilities using biometrics.
This product is a physical security control device, but rather than just a fingerprint, this reader also uses PIN numbers, prox cards or contactless smart ...
This product can integrate into the environment and replace password logons for workstations, files, external drives and networks.
DigitalPersona Pro was designed for bringing biometric fingerprint scanning into the large-scale enterprise.
IdentiPHI's SAFsolution 5 Enterprise Edition builds a platform on which an enterprise can integrate biometrics into the already existing environment.
The Valid Secure System Authentication (VSSA) from Valid Technologies provides a platform to build biometrics seamlessly into the existing infrastructure.