Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Security product and tools news and releases: Trend Micro, Citrix

@exb @exe WANScaler 8000 series, NetScaler 7.0 Citrix Price: WANScaler 8500 starts at $8,500, 8800 at $40,000; NetScaler 7.0 at $17,499 The WANScaler 8000 series of wide area network optimization solutions have dynamic multi-level compression technology with extended disk-based history that can improve application response times for branch office employees. The 7.0 release of the NetScaler SSL VPN improves scalability, application policy management, app availability and enhanced security, including enhanced management of access control lists, improved management and configuration, as well as VoIP and IM support. iPolicy Security Manager and Intrusion Prevention Firewalls 3.0 iPolicy Networks Price: $5,000 to $120,000 The latest iPolicy product release includes real-time vulnerability correlation with support for multiple vulnerability assessment scanners. It provides dynamic intrusion detection/prevention (IDS/IPS) actions and improved IDS/IPS accuracy, among several other new security capabilities. The release also introduces ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close