Access "Recent releases: Security product briefs, June 2006"
This article is part of the June 2006 issue of Is your data safe from next-generation attackers?
@exb @exe Fidelis Security Systems' DataSafe 3.9 prevents the unauthorized network transfer of critical or sensitive information across all channels on gigabit-speed networks, including e-mail, http, Web mail, FTP, instant messaging and peer-to-peer communications. The latest version includes prebuilt policies and an improved interface. DataSafe's port- and protocol-independent architecture enables fast implementation and all-channels prevention without change to desktops, servers or network devices. Pricing starts at $65,000 per sensor. Insightix's Enterprise Collector 2.0 continuously monitors the network and provides a complete inventory of all network elements. It tracks in real time all the elements that are currently and previously connected to the network. Security managers can be alerted as elements reconnect to the network, improving unauthorized device detection, and configuration, asset and patch management. Pricing begins at $4,000, based on the number of elements on the network. Avinti's iSolation Server 2.1 creates a virtual machine to test ... Access >>>
Premium Content for Free.
Network Access Control: StillSecure's Safe Access 4.1
StillSecure's Safe Access 4.1
Hot Pick: BlueCat Networks' Adonis 1000
BlueCat Networks' Adonis 1000
Today's Attackers Can Find the Needle
EMERGING THREATS From massive botnets to targeted phishing and transacting Trojans, today's new breed of attacker is more dangerous than ever.
Intrusion Prevention: McAfee's IntruShield 3000
McAfee's IntruShield 3000
Unified Threat Management Guide for Managers
A special guide bringing together all types of threat management. Find advice on firewalls, IPS, antivirus, antispam and more.
Extrusion Detection: Security Monitoring for Internal Intrusions
Read a review of the security book Extrusion Detection: Security Monitoring for Internal Intrusions.
- Network Access Control: StillSecure's Safe Access 4.1
This is a definition of biometrics by sister site whatis.com.
Configuration Management: FullArmor's FullArmor PolicyPortal
FullArmor's FullArmor PolicyPortal
Recent releases: Security product briefs, June 2006
Learn about the security products released in June 2006.
Reworking Risk Policy
POLICIES Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync.
Exploring your Endpoint Protection Options
Understand your options for building an endpoint security solution. Get advice on network access control (NAC), Network Access Protection, endpoint security policy definition, enforcement and detection.
- Biometrics by WhatIs.com
Perspectives: Security training must be a visual, interactive experience
Security awareness training exercises must be interactive and visually stimulating, and must help users judge the validity and reliability of websites and web content.
On The Radar: Preparing for managed security services
Editor's Desk: Debating a national data protection law
Wanted: Federal Legislation
Ping: Don Ulsch
- Perspectives: Security training must be a visual, interactive experience
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...