Access "Product review: Credant Mobile Guardian 6.0"
This article is part of the June 2008 issue of Five crucial virtualization do's and don'ts
MOBILE SECURITY Credant Mobile Guardian 6.0 REVIEWED BY SANDRA KAY MILLER Credant Technologies Price: Starts at $85 per user The latest version of Credant Mobile Guardian (CMG) offers a unified Web-based management portal that lets administrators discover, secure and monitor endpoints, regardless how they touch the enterprise network. Installation/Configuration B Be prepared to dedicate some time to install and deploy its components in large, distributed environments to ensure for efficient scalability. Even our basic installation consumed a significant amount of configuration time. The Gatekeeper component listens for synchronization between mobile devices and workstations, performs automatic discovery of mobile devices, distributes up-dates, policies and encryption keys, and performs monitoring, reporting and application control. Agents enforce policies, regardless of connection status. The Enterprise Server is managed through a browser-based interface that works equally well on Internet Explor- er and Firefox. Integrating with Active Directory provided ... Access >>>
Premium Content for Free.
Virtualization server security best practices
by Thomas Ptacek
Avoid server virtualization security bad practices with these dos and don'ts. Get info on virtualization products, segmentation, implementation, avoiding malware, and staging, deploying and patching virtual machines, segmentation and implementation.
Product review: Credant Mobile Guardian 6.0
Product review: Klocwork Insight 8.0
Embedded Security Safeguards Laptops
Tech Focus: Secure From Within
Security Awareness Employee Training Essential to Infosec Program
Security awareness training initiatives such as online tutorials, newsletters, MP3s and prizes get the security message across to users.
- Virtualization server security best practices by Thomas Ptacek
Spam Blockers Losing Ground on Sophisticated Attackers
SPAM Spam hasn't been "solved"; in fact, the scourge has grown worse as attackers continually trump countermeasures and refine their focus on high-value targets.
Product review: Mu-4000 Security Analyzer
Product review: Array Networks SPX2000
Security Services: QualysGuard Security and Compliance Suite
At Your Service
GRC Tools Help Manage Regulations
GOVERNANCE, RISK AND COMPLIANCE We look at three GRC products and the distinct ways these tools can help organizations navigate the complicated regulatory game.
- Spam Blockers Losing Ground on Sophisticated Attackers
CISOs Must Innovate to Enable Business
Editor's Desk: Be an Enabler
Architect Security and Compliance Programs to Be Complementary
Perspectives: Shake On It
Address Authentication and Transaction Validation Protocols to Stem Identity Theft
Layer8: Tarnishing Good Names
Interview: Financial Services CISO David Pollino
CISO Uses Predictive Analystics to Bolster Risk Management Program
- CISOs Must Innovate to Enable Business
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...