Access "Recent Releases: Security product briefs, January 2006"
This article is part of the January 2006 issue of How to stop data leakage
@exb @exe Breach Security's BreachGate WebDefend provides comprehensive application-specific security against Web-based threats, without inline deployment. It also protects Web applications by integrating with existing inline network devices such as network firewalls and load-balancers. WebDefend automatically builds and maintains a profile of acceptable application behavior that is used to validate all communication with the Web application; outbound traffic is also monitored for data leaks. WebDefend pricing starts at $20,000. Rapid7's NeXpose Appliance for vulnerability management scans devices, systems, software and Web server applications to locate threats, assess risk, devise remediation plans and implement the ticketing process. NeXpose builds a vulnerabilities knowledgebase and models potential attacks. The reporting capabilities aid compliance with government regulations and corporate security policies. Rapid7 offers a line of three appliances in addition to NeXpose software. Pricing for the NeXpose appliances starts at $14,000 for 64 IP addresses. ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...