Issue OverviewInformation Security magazine - February 2006
In this issue, we crown the best-of-breed security products in 13 categories. Learn which ones made the cut. Also, get information on the shrinking security market, and tips for protecting stored data. Access >>>
Premium Content for Free.
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
Where do you turn when the security vendor you've banked on gets gobbled up?
- Stopping the Next Heist
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
- Products of the Year 2006
On The Radar: Avoiding security upgrade disaster
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
Ping: Yan Noblot
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
- On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...