Access "Aerial View"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
TECHKNOWLEDGE Vulnerability management tools provide a realistic picture of the enterprise, where vulnerabilities are viewed in the context of the IT landscape. Imagine jumping from a plane. Your view from the air is quite different than your view on the ground. And the perception of your surroundings changes as you parachute down. That's because perception is subjective, individual and often fluctuates as new factors arise. The same notion is true when it comes to securing enterprise networks. By bringing perceptions of the network in line with reality, security practitioners can reduce the likelihood of mistakes. That's where vulnerability management (VM) comes in. Vulnerability management is an effective way for enterprises to understand their networks--without any preconceived notions. Case in point: If the perception is that the patch process covers all critical systems, yet the reality is that the corporate e-mail server farm is unpatched, there's a good chance of serious trouble when the next big worm comes around. By using the four essential tools of... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
-
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
-
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
-
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
-
Antispyware: SurfControl's Enterprise Threat Shield 3.0
SurfControl's Enterprise Threat Shield 3.0
-
Firewall VPN
ZyXEL Communication's ZyWALL P1
-
Secure Reads: Contemporary Cryptography
-
-
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
-
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
-
Aerial View
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
-
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
-
On the Line
See how five IPS appliances match up against attacks.
-
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
-
Columns
-
Editor's Desk: An email security guide for managers
Knights of Spamalot
-
Layer 8: SOX security spending is an old, wrinkled tactic
Darned SOX
-
Ping: Katrina's Security Survivors
Katrina's Security Survivors
-
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
-
Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO