Access "Endpoint Security: F-Secure's Client Security 7.0"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
ENDPOINT SECURITY F-Secure Client Security 7.0 REVIEWED BY BRENT HUSTON F-Secure Price: $29.75 per user for 100 licenses In the face of criminal zero-day exploits, targeted attacks and mobile workforces, companies are increasingly seeking comprehensive endpoint security tools. F-Secure Client Secu-rity, a business-grade, centrally managed suite, addresses emerging threats, as Version 7 adds rootkit scanning and host-based intrusion prevention (HIPS). Installation & Features B+ Both the Policy Manager and client software install in a snap. By default, the antivirus scanner does not look inside archives, or force a complete system scan upon installation, saving system resources and time. It removes other antivirus or firewall products, although it left Comodo Firewall on one of our test systems. Client Security suite consumed about 80 MB of memory on our test systems--a little high, but not excessive. In addition to new rootkit scanning and HIPS capabilities, Client Security suite features an antivirus and antispyware scanner, mail and Web proxies, and ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
-
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
-
Securing Extranets
Is perimeter security viable with Swiss cheese networks?
-
At Your Service: Veracode's SaaS-based application analysis
Veracode
-
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
-
Emerging Technologies: How to secure new products
-
-
Office Politics
Success requires skills in business, technology and people.
-
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
-
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
-
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
-
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
-
Office Politics
-
Columns
-
Ping: Dave Drab
Dave Drab
-
Perspectives: Smoke and mirrors certifications
Professional organizations use ethics policies to protect their certifications instead of promoting ethical behavior.
-
Editor's Desk: Freeing Julie Amero
Justice Served
- Viewpoint: Background check faux pas
-
Ping: Dave Drab
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO