Access "View Point"
This article is part of the January 2007 issue of Keep today's threats close and tomorrow's closer
Symantec Snub In response to Dennis Fisher's "Symantec 2.0" (November 2006), I think that Symantec is losing market share (at least my small part of it)--not gaining it--due to its acquisitions. The company is doing too much not well enough. I'd been a user and a fan of many of its enterprise products for over 12 years, now I'm switching to others as fast as I can. I used to use three of its main products--Veritas Backup Exec, Enterprise Antivirus and Security Gateway appliances. Now, we've solved user problems by removing the Symantec products and putting in Sophos; users are raving about how much faster their PCs are and how many fewer issues they've had to deal with. You think the Symantec transformation was a good one? Maybe from somewhere high above the forest, it does look pretty. Down here in the trees, though, it's pretty ugly. Jim MacLachlan Network administrator, The Shelter Group Differing Opinions In Bruce Schneier and Marcus Ranum's recent column "Do Federal Regulations Help?" (Face-Off, November 2006), the main disagreement seems to be over the... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
How to setup and configure syslog to view and filter data
Your network devices are trying to tell you that you're under atta ck. Syslog helps you sort through the data overload and get the message.
-
SonicWALL SSL VPN 4000 product review
In this product review of SonicWALL SSL VPN 4000 security tool and appliance get information on setup, pricing, configuration, installation, remote access and policy features.
-
UTM product review: WatchGuard Technologies' Firebox X 1250e
WatchGuard Technologies' Firebox X 1250e
-
Identity Management: Apere's IMAG 500
Apere's IMAG 500
-
Mixed Signals
by Mark Baard
RFID gives businesses-and bad guys-an easy way to track and change information.
- View Point
-
How to setup and configure syslog to view and filter data
-
-
Core Security Technologies Core Impact 6.0 security tool review
In this product review, learn how Core Security Core Impact 6.0 tool can assist in ethical hacking a penetration testing, and get info on setup, reporting and management.
-
Virtual Threats
by Dennis Fisher
Virtual machines save you money in the data center, but can you ignore their security implications any longer?
-
Recent Releases: Security product briefs, January 2007
Read about the security products that launched in January 2007.
- At Your Service: January 2007 managed services security news
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Who's There?
Enterprises have a pressing need for endpoint security, but choosing a system that screens PCs before allowing them network access requires careful consideration.
-
Core Security Technologies Core Impact 6.0 security tool review
-
Columns
-
Ping: Nikk Gilbert
Nikk Gilbert
-
Editor's Desk: Celebrating 10 years of Information Security magazine
A Toast to Ten Years
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Perspectives: Post-admission controls the next step for NAC
Post-admission controls would shore up NAC/NAP shortcomings.
-
Ping: Nikk Gilbert
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO