Issue OverviewInformation Security magazine - February 2006
In this issue, we crown the best-of-breed security products in 13 categories. Learn which ones made the cut. Also, get information on the shrinking security market, and tips for protecting stored data. Access >>>
Premium Content for Free.
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
Where do you turn when the security vendor you've banked on gets gobbled up?
- Stopping the Next Heist
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
- Products of the Year 2006
On The Radar: Avoiding security upgrade disaster
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
Ping: Yan Noblot
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
- On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.