Access "Unified Threat Management: Secure Computing's Sidewinder 2150 v7"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
UNIFIED THREAT MANAGEMENT Sidewinder 2150 v7 REVIEWED BY DAVID STROM Secure Computing Price: Varies; as tested, $35,900 In its June issue, Information Security tested six Unified Threat Management (UTM) boxes; this month we review Secure Computing Sidewinder UTM, specifically the large-enterprise 2150 appliance. The new Sidewinder release was too late for the comparative evaluation, but would stack up in the middle of the pack. Enterprise Management/Control B- Sidewinder has a collection of different software management tools. Unlike most other UTM products, it does not have a built-in Web server but uses a Windows-based tool that doesn't run on Vista yet. One big drawback is that the product doesn't include a DHCP server for the local network; you'll need to supply your own. It took about an hour to set up. Sidewinder doesn't allow multiple concurrent administrators to save configurations, although they can view configuration and monitor operations. It also comes with dual power supplies, which is handy if one fails. It also has two available add-in slots... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...