Access "Access Management"
This article is part of the May 2005 issue of Keeping on top of risk management and data integrity essentials
EdgeWall 7000 series Vernier Networks Price: Starts at $9,000 @exb EdgeWall 7000 series @exe Access control isn't an either/or proposition. Enforcing security policy without hamstringing normal business activity is a balancing act that factors in device vulnerability and the criticality of the applications and data being accessed. Vernier Networks' EdgeWall 7000 puts enterprises in control of this process, automating business continuity through an intelligent integration of vulnerability assessment and access management. Sitting in front of switches and wireless APs, the EdgeWall 7000 series of high-throughput appliances provides dynamic, granular access control based on identity and vulnerability assessment to protect critical apps and data from dangerously vulnerable or compromised devices. It allows normal business where risk exposure is acceptable. For example, critical re-sources, like financial records, must be protected at all costs, while an intranet page listing corporate polices or events can still be accessed by clients that have security flaws. ... Access >>>
Premium Content for Free.
Desktop Security: GreenBorder Enterprise Security
GreenBorder Technologies' GreenBorder Enterprise Security Solution
Snapping on SNMPv3
The ubiquitous management protocol is more secure, but upgrading isn't simple.
Hot Pick: Polivec Compliance Management System 3.7
Polivec's Polivec Compliance Management System 3.7
It doesn't come easy when you federate identity management.
SonicWALL's PRO 1260
Big Brother's Watchful Eye
Our survey finds that enterprises are spending big on management systems to meet regulatory requirements.
- Desktop Security: GreenBorder Enterprise Security
Recent Releases: Security product briefs, May 2005
Read about the information security products released in May 2005.
Keeping the Data & Oil Flowing
When ChevronTexaco puts a drill in the ground, it must live with that decision for decades. Risk management and data integrity are essential.
Secure Reads: The Art of Computer Virus Research and Defense
Read a review of The Art of Computer Virus Research and Defense.
Instant Messaging: Akonix L7 Enterprise 4.0
Akonix Systems' Akonix L7 Enterprise 4.0
Vernier Networks' EdgeWall 7000 series
- Recent Releases: Security product briefs, May 2005
Layer 8: Debating policy vs. technology
Logoff: Let's not cheapen information security certifications
Dollars & Certs
Perspectives: Windows Server 2003 security stands up
One study concludes that Windows Server 2003 is more secure than Linux.
Ping: Bruce Bonsall
MassMutual's Bruce Bonsall
Editor's Desk: Targeted malware
- Layer 8: Debating policy vs. technology
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...