Access "Antispyware: SurfControl's Enterprise Threat Shield 3.0"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
Enterprise Threat Shield 3.0 SurfControl Price: $11.40 per user for 500 users @exb SurfControl's Enterprise Threat Shield protects against spyware while controlling user Internet activity. @exe Dependence on Internet connectivity and your users' minute-by-minute exposure to malicious apps such as spyware and Trojans put your company at risk. SurfControl's Enterprise Threat Shield (ETS) attacks the problem from both ends, protecting clients against compromise while monitoring and limiting your users' Internet activity. ETS employs agent technology to monitor Windows clients, but the focus is on machines logged into the network--there's no offline protection if the device is rebooted away from the network. The ETS server loads the agent directly into memory when the device is booted on the network. No client installation is needed, and the agent runs in stealth mode, transparent to the user. The agent will remain active in memory if the network connection is lost, but it's gone once the user shuts down. The trade-off is that there's no need to manage yet ... Access >>>
Premium Content for Free.
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
Antispyware: SurfControl's Enterprise Threat Shield 3.0
SurfControl's Enterprise Threat Shield 3.0
ZyXEL Communication's ZyWALL P1
- Secure Reads: Contemporary Cryptography
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
On the Line
See how five IPS appliances match up against attacks.
- Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
Editor's Desk: An email security guide for managers
Knights of Spamalot
Layer 8: SOX security spending is an old, wrinkled tactic
Ping: Katrina's Security Survivors
Katrina's Security Survivors
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
- Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...