Issue OverviewInformation Security magazine - February 2006
In this issue, we crown the best-of-breed security products in 13 categories. Learn which ones made the cut. Also, get information on the shrinking security market, and tips for protecting stored data. Access >>>
Premium Content for Free.
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
Where do you turn when the security vendor you've banked on gets gobbled up?
- Stopping the Next Heist
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
- Products of the Year 2006
On The Radar: Avoiding security upgrade disaster
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
Ping: Yan Noblot
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
- On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...