Compliance is an opportunity to run operations in a more consistent and predictable manner, says Harish Rao, chairman & CEO, nSolutions.
More and more companies are getting requests for FISMA control assessments, says David Lawson, director, risk management and compliance, Acumen Solutions.
With e-discovery laws in effect, companies find benefits to data archiving, says TLC Vision's Roger McIlmoyle.
To keep up with its expansion, Denver-based Frontier Airlines sought to centralize its firewall needs.
Small- and medium-sized enterprises are often ignored by security vendors, and contend with unsavvy users a lot.
Data breach laws have proven to be helpful to consumers, but daunting to those charged with enforcement.
Can the Federal Information Security Management Act have an upside to the government, Eric Butterman asks.
The U.S. should engage with the world to combat cyberthreats, says Howard Schmidt.
A Java-based web management platform that enables users to manage many key aspects of SonicWALL’s product line.
A web-based configuration and change management solution for network devices.
A series of client server and web-based components designed to assist with workstation/server configuration and vulnerability management.
A combination of client server and web-based components to help organizations manage configurations of workstations and servers.
A suite of client server and web components that are primarily used for network security device configuration management, as well as auditing to support change ...
An appliance-based security operations solution that is used to manage policies for firewalls only.
This product is the ultimate tool for finding and exploiting possible holes in a network.
This product incorporates all the great features of the Retina Scanner with added capabilities for compliance and patch management.
The GFi LANguard Network Security Scanner focuses into three areas of network security scanning.
A fairly robust vulnerability scanner that enables administrators to identify and scan all network-attached assets for three types of vulnerabilities.
This tool is customized and tailored to the environment for absolute pinpoint accuracy and in-depth vulnerability analysis.
A feature-packed vulnerability assessment and risk analysis tool that always goes beyond expectations.
Two great tools wrapped up to work together to provide an in-depth view of vulnerabilities throughout a network.
This product can be used to audit Windows, Cisco or Solaris systems, as well as Oracle and SQL database servers.
The StillSecure VAM appliance is serious vulnerability management in a single device.
The way I see these products is that we are really looking at two products. The first is Nessus and Passive Vulnerability Scanner, and the ...