Access "Game Over?"
This article is part of the February 2006 issue of Best-of-breed: Security Products of the Year: 2006
Where do you turn when the security vendor you've banked on gets gobbled up? After a few installation hiccups, the firewall worked beautifully. Jeff Pentz and his IT staff with the University Health Center at the University of Georgia were pleased with their purchase. All was right with the world. That is, until another company acquired their firewall vendor. When Pentz's team ran into problems deploying the firewall vendor's VPN software and called for support, they encountered a company in the flux of a merger. What he thought would be a simple two-day fix became a futile exchange of e-mails and phone calls with an ever-changing parade of engineers and managers over several weeks. "It was a nightmare for us," says Pentz, the center's associate IT director. Pentz is not alone. A crush of consolidation--more than 40 security firms have been acquired in the past four years--has caused users a number of headaches, including service, support and sometimes even obsolete technology. And there's no end in sight. Morgan Stanley reports that the pace of mergers and ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Stopping the Next Heist
Storage and backup systems are rife with vulnerabilities. Take seven steps to secure them, or risk unflattering headlines and legal problems.
-
Secure Reads: Real Digital Forensics
Read a review of the security book Real Digital Forensics.
-
Portable device security: Safend's Safend Protector
Read a security product review of Safend's Safend Protector.
-
Recent Releases: Security product briefs, February 2006
Read about the security products released in February 2006.
-
Game Over?
Where do you turn when the security vendor you've banked on gets gobbled up?
-
Stopping the Next Heist
-
-
Products of the Year 2006
Antispyware; Antivirus; Authentication; E-mail Security; Identity & Access Management; Intrusion Detection; Intrusion Prevention; Network Firewall; Remote Access; Network Security Management; Vulnerability Management; Wireless; Emerging Technologies
-
Hot Pick: Stonesoft's StoneGate SG-4000
Stonesoft's StoneGate SG-4000
-
E-mail Security: Barracuda Spam Firewall
by Tom Bowers, Contributor
Barracuda Networks' Barracuda Spam Firewall
-
Intrusion Prevention: Lucid Security's ipAngel 4.0
Lucid Security's ipAngel 4.0
-
Products of the Year 2006
-
Columns
-
On The Radar: Avoiding security upgrade disaster
Upgrade Agony
-
Perspectives: Pwning the C-suite
Losing a few too many battles? Positive social engineering can help.
-
Ping: Yan Noblot
Yan Noblot
-
Editor's Desk: When customers become victims of acquisitions
Survival of the Fittest?
-
On The Radar: Avoiding security upgrade disaster
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO