Access "Desktop Security: GreenBorder Enterprise Security"
This article is part of the May 2005 issue of Keeping on top of risk management and data integrity essentials
GreenBorder Enterprise Security Solution GreenBorder Technologies Price: Starts at $59.95/seat for IE; $24.95/seat for Outlook @exb GreenBorder Enterprise Security Solution @exe GreenBorder approaches malicious code with a unique attitude--"Who cares?" Enterprise Security Solution doesn't detect anything; it protects Internet Explorer and Outlook users from themselves through a sandboxing technique that allows arbitrary code from untrusted sources to execute harmlessly. Virtualization and trust are key to GreenBorder's effectiveness. Security managers assign trusted status to specific e-mail domains and servers, and to network address ranges for Web servers. GreenBorder's desktop agent forces IE or Outlook to run in a virtualized environment for untrusted sources, preventing malicious code from accessing system resources or user data. One limitation is that trusted domains are generally assumed to be under the control of the organization. This makes it difficult to extend the trust model outside organizations. As a practical matter, most sources are treated ... Access >>>
Premium Content for Free.
Desktop Security: GreenBorder Enterprise Security
GreenBorder Technologies' GreenBorder Enterprise Security Solution
Snapping on SNMPv3
The ubiquitous management protocol is more secure, but upgrading isn't simple.
Hot Pick: Polivec Compliance Management System 3.7
Polivec's Polivec Compliance Management System 3.7
It doesn't come easy when you federate identity management.
SonicWALL's PRO 1260
Big Brother's Watchful Eye
Our survey finds that enterprises are spending big on management systems to meet regulatory requirements.
- Desktop Security: GreenBorder Enterprise Security
Recent Releases: Security product briefs, May 2005
Read about the information security products released in May 2005.
Keeping the Data & Oil Flowing
When ChevronTexaco puts a drill in the ground, it must live with that decision for decades. Risk management and data integrity are essential.
Secure Reads: The Art of Computer Virus Research and Defense
Read a review of The Art of Computer Virus Research and Defense.
Instant Messaging: Akonix L7 Enterprise 4.0
Akonix Systems' Akonix L7 Enterprise 4.0
Vernier Networks' EdgeWall 7000 series
- Recent Releases: Security product briefs, May 2005
Layer 8: Debating policy vs. technology
Logoff: Let's not cheapen information security certifications
Dollars & Certs
Perspectives: Windows Server 2003 security stands up
One study concludes that Windows Server 2003 is more secure than Linux.
Ping: Bruce Bonsall
MassMutual's Bruce Bonsall
Editor's Desk: Targeted malware
- Layer 8: Debating policy vs. technology
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.