Issue OverviewInformation Security magazine - February 2006
In this issue, we crown the best-of-breed security products in 13 categories. Learn which ones made the cut. Also, get information on the shrinking security market, and tips for protecting stored data. Access >>>
Premium Content for Free.
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
Where do you turn when the security vendor you've banked on gets gobbled up?
- Stopping the Next Heist
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
- Products of the Year 2006
On The Radar: Avoiding security upgrade disaster
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
Ping: Yan Noblot
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
- On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...