Access "Antispyware: Webroot Software's Spy Sweeper Enterprise"
This article is part of the January 2005 issue of How security pros can benefit from information sharing
Spy Sweeper Webroot Software Price: Starts at $39.95 @exb Spy Sweeper @exe If spyware was only a desktop problem on home PCs, vendors wouldn't be rushing to get enterprise-grade products to market. Webroot has expanded on its respected workstation product with Spy Sweeper Enterprise, complete with client-server technology that gives security managers the ability to install, update and monitor distributed scanners from a central console. Spy Sweeper is a good first effort with some strong management features, but it lacks a Web-based console and strong reporting capabilities. Spy Sweeper can be distributed in minutes through login scripts or Active Directory group policies. The management console can be configured to poll Webroot's update server for malware updates. The versatility of Spy Sweeper's admin console is impressive, enabling security managers to organize clients into logical groups for flexibility and multiple configurations. Policies can be applied globally, by group or individually. For example, the users in the management group may have a policy... Access >>>
Premium Content for Free.
You're just plugging holes if you don't have the right processes and policies.
The Sky's the Limit
What security technology do you need that you can't get today? Here's your wish list.
Content Filtering: Websense Enterprise 5.5
Websense's Enterprise 5.5
Authentication: RSA SecurID 6.0 for Windows
RSA Security's SecurID 6.0 for Windows
Seattle CISOs Ernie Hayden and Kirk Bailey are pioneering a new level of trust and cooperation to secure their enterprises.
Hot Pick: F5 Networks' FirePass 4100 Series
F5 Networks' FirePass 4100 Series
- Vulnerability Mismanagement
Antispyware: Webroot Software's Spy Sweeper Enterprise
Webroot Software's Spy Sweeper Enterprise
Secure Reads: Gray Hat Hacking
Gray Hat Hacking: The Ethical Hacker's Handbook
Recent Releases: Security product briefs, January 2005
Learn about the information security products released in January 2005.
by Steven Weil, Contributor
Avinti's iSolation Server 1.1
The Myths of Security
The ancient Greeks spun myths to explain the unexplainable. Modern enterprises use commonly held myths as a foundation for security.
Key to the World
SAML's portable trust makes federated identity work.
- Antispyware: Webroot Software's Spy Sweeper Enterprise
Logoff: Government tosses pennies toward information security
Death by a Thousand Cuts
Editor's Desk: Remembering the dearly departed
Built to Sell
Layer 8: The security governance myth
Perspectives: Walk in management's shoes
One security manager describes his experience with a management program that helped him understand how to align security with business objectives.
- Logoff: Government tosses pennies toward information security
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...