Access "Hot Pick: SecureWave's Sanctuary Device Control 3.0.1"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
Sanctuary Device Control 3.0.1 SecureWave Price: Starts at $45 per managed PC @exb Sanctuary Device Control is a powerful tool to manage user interactions with hardware devices on managed systems. @exe It's your company's equipment and your company's intellectual property. If you don't want employees treating either as if it were their own, you need an effective way to enforce corporate policy. SecureWave's Sanctuary Device Control allows security managers to exercise granular control over user interactions with hardware devices, such as removable media, local hard drives, printers, network adapters and scanners. Device Control's rich feature set allows you to create general or specific rules that control device usage. For example, you can dictate, "No users may access USB storage devices," and be as specific as "Richard Jones may only listen to music CDs on the weekend, when he is not connected to the corporate network." The Sanctuary client is installed on each managed system and interacts with a Sanctuary Application Server, which can manage up to 5,000 ... Access >>>
Premium Content for Free.
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
Antispyware: SurfControl's Enterprise Threat Shield 3.0
by Steven Weil, Contributor
SurfControl's Enterprise Threat Shield 3.0
ZyXEL Communication's ZyWALL P1
- Secure Reads: Contemporary Cryptography
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
On the Line
See how five IPS appliances match up against attacks.
- Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
Editor's Desk: An email security guide for managers
Knights of Spamalot
Layer 8: SOX security spending is an old, wrinkled tactic
Ping: Katrina's Security Survivors
Katrina's Security Survivors
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
- Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...