Access "Recent Releases: Security product briefs, November 2005"
This article is part of the November 2005 issue of Comparing five of the top network-based inline IPS appliances
@exb @exe Tenable Network Security's Thunder 2.0 Security Event Manager, a module for the company's Lightning Security Manager, centralizes, analyzes and shares log information for compliance, incident response, intrusion detection and performance monitoring. Added features include event correlation and behavior anomaly detection. Thunder's statistical monitoring of devices identifies changes in expected behaviors regardless of log source; logs are generated if there is any abnormal increase in event types. Thunder 2.0 SEM starts at $20,000. Mirage Network's CounterPoint 2.2 network security appliance software has been upgraded to include NAT traversal support, management capabilities for up to 50 distributed CounterPoint appliances, and performance enhancements that double the number of covered endpoints. This version also provides zero-day protection at the switch, monitoring all endpoints to prevent threats from propagating to other network devices, and offers agentless, out-of-band deployment. CounterPoint 2.2 appliances start at $15,000. Altiris' ... Access >>>
Premium Content for Free.
Secure Reads: Contemporary Cryptography
Read a review of the book Contemporary Cryptography.
Application Security: Secure Software's CodeAssure Suite
Secure Software's CodeAssure Suite
Avoiding Network Traffic Confusion with Consistent Firewall Rules
Keep network traffic flowing by collaborating firewall rules and network access devices.
Content Filtering: InterScan Web Security Suite 2.5
Trend Micro's InterScan Web Security Suite 2.5
Antispyware: SurfControl's Enterprise Threat Shield 3.0
by Steven Weil, Contributor
SurfControl's Enterprise Threat Shield 3.0
ZyXEL Communication's ZyWALL P1
- Secure Reads: Contemporary Cryptography
Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
SecureWave's Sanctuary Device Control 3.0.1
E-mail Security Guide for Managers
Staying on top of the latest e-mail threats.
Vulnerability tools provide a realistic view of the enterprise, where vulnerabilities are viewed in the context of the IT landscape.
Recent Releases: Security product briefs, November 2005
Learn about the security products that launched in November 2005.
On the Line
See how five IPS appliances match up against attacks.
- Hot Pick: SecureWave's Sanctuary Device Control 3.0.1
Editor's Desk: An email security guide for managers
Knights of Spamalot
Layer 8: SOX security spending is an old, wrinkled tactic
Ping: Katrina's Security Survivors
Katrina's Security Survivors
Perspectives: ITIL has application in security
The Information Technology Infrastructure Library (ITIL) is a set of best practices and guidelines for managing IT services can be applied to information security.
- Editor's Desk: An email security guide for managers
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...