Access "Endpoint Security: F-Secure's Client Security 7.0"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
ENDPOINT SECURITY F-Secure Client Security 7.0 REVIEWED BY BRENT HUSTON F-Secure Price: $29.75 per user for 100 licenses In the face of criminal zero-day exploits, targeted attacks and mobile workforces, companies are increasingly seeking comprehensive endpoint security tools. F-Secure Client Secu-rity, a business-grade, centrally managed suite, addresses emerging threats, as Version 7 adds rootkit scanning and host-based intrusion prevention (HIPS). Installation & Features B+ Both the Policy Manager and client software install in a snap. By default, the antivirus scanner does not look inside archives, or force a complete system scan upon installation, saving system resources and time. It removes other antivirus or firewall products, although it left Comodo Firewall on one of our test systems. Client Security suite consumed about 80 MB of memory on our test systems--a little high, but not excessive. In addition to new rootkit scanning and HIPS capabilities, Client Security suite features an antivirus and antispyware scanner, mail and Web proxies, and ... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...