Access "E-Mail Security"
This article is part of the January 2005 issue of How security pros can benefit from information sharing
Avinti iSolation Server 1.1 Avinti Price: Starts at $20 Avinti iSolation Server 1.1 It's in your inbox--an e-mail with an unfamiliar attachment from a trusted coworker. Is it legitimate or has it been spawned by an e-mail spoofing worm that captured your address from an infected system? Some enterprises prohibit types of e-mail attachments, but that means blocking whole file classes and impeding operations for the sake of security. Others depend on resource-intensive gateway filters. Avinti has come up with a clever idea to stop e-mail malware without necessarily prohibiting attachment types, but retaining network performance: the Avinti iSolation Server (AIS). AIS is a gateway software product placed in front of any SMTP-based e-mail server. Running on Windows 2000/2003, the IIS SMTP virtual server intercepts all incoming e-mail messages and passes them through a simulated computer running Windows 2000, Microsoft Office, WinZip, Adobe Acrobat and other common applications. The downside is that the current version is a only suited for small businesses ... Access >>>
Premium Content for Free.
You're just plugging holes if you don't have the right processes and policies.
The Sky's the Limit
What security technology do you need that you can't get today? Here's your wish list.
Content Filtering: Websense Enterprise 5.5
Websense's Enterprise 5.5
Authentication: RSA SecurID 6.0 for Windows
RSA Security's SecurID 6.0 for Windows
Seattle CISOs Ernie Hayden and Kirk Bailey are pioneering a new level of trust and cooperation to secure their enterprises.
Hot Pick: F5 Networks' FirePass 4100 Series
F5 Networks' FirePass 4100 Series
- Vulnerability Mismanagement
Antispyware: Webroot Software's Spy Sweeper Enterprise
Webroot Software's Spy Sweeper Enterprise
Secure Reads: Gray Hat Hacking
Gray Hat Hacking: The Ethical Hacker's Handbook
Recent Releases: Security product briefs, January 2005
Learn about the information security products released in January 2005.
by Steven Weil, Contributor
Avinti's iSolation Server 1.1
The Myths of Security
The ancient Greeks spun myths to explain the unexplainable. Modern enterprises use commonly held myths as a foundation for security.
Key to the World
SAML's portable trust makes federated identity work.
- Antispyware: Webroot Software's Spy Sweeper Enterprise
Logoff: Government tosses pennies toward information security
Death by a Thousand Cuts
Editor's Desk: Remembering the dearly departed
Built to Sell
Layer 8: The security governance myth
Perspectives: Walk in management's shoes
One security manager describes his experience with a management program that helped him understand how to align security with business objectives.
- Logoff: Government tosses pennies toward information security
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...