Access "Content Filtering: InterScan Web Security Suite 2.5"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
InterScan Web Security Suite 2.5 Trend Micro Price: Starts at $20.16 for 5-25 seats @exb Trend Micro's InterScan Web Security Suite provides gateway protection against Internet-borne attacks and malware. @exe Increasingly, enterprises are looking beyond traditional desktop AV to stop Internet-borne threats--viruses, worms, identity and data theft, and employees' sometimes promiscuous browsing habits. Trend Micro, well known for desktop AV, offers a strong gateway product, InterScan Web Security Suite, to complete the one-two punch against attacks. We found that the suite is an effective security tool with strong central management and highly flexible policy controls. In our lab tests, InterScan stopped sample EICAR attack files and allowed us to safely navigate a number of Web sites with ActiveX and Java content. Filtering Java and ActiveX applets provides protection against execution-based threats; if Java and ActiveX are blocked, permitted sites containing such content can be allowed by policy. We found that blocking all active content and then creating a ... Access >>>
Premium Content for Free.
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
Antispyware: SurfControl's Enterprise Threat Shield 3.0
SurfControl's Enterprise Threat Shield 3.0
ZyXEL Communication's ZyWALL P1
- Secure Reads: Contemporary Cryptography
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
On the Line
See how five IPS appliances match up against attacks.
- Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
Editor's Desk: An email security guide for managers
Knights of Spamalot
Layer 8: SOX security spending is an old, wrinkled tactic
Ping: Katrina's Security Survivors
Katrina's Security Survivors
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
- Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...