Access "Product Review: Workshare Protect Premium 6.0"
This article is part of the September 2008 issue of Lessons learned from good and bad NAC implementations
DATA LOSS PREVENTION Workshare Protect Premium 6.0 REVIEWED BY ADAM HOSTETLER Workshare Price: Starts at $49.95 per client Workshare Protect Premium 6.0 seeks to eliminate the malicious or accidental leakage of sensitive corporate data. Workshare is client software that allows you to assess document risk, preserve content integrity and prevent disclosure of sensitive or confidential information. It installs several utilities and also integrates with products such as Microsoft Office and Lotus Notes. Policy B+ The Policy Designer allows Workshare to be customized for your environment. Overall, it's well thought out, making it easy to create new policies. For example, we crafted a policy that searched for the word "confidential" in all text and HTML documents. You determine the files that are searched, such as Office, RTF, text, HTML, zip, XML and PDF. You can also create regular expressions (regex) to search for any standardized data such as account numbers. Several other criteria can be matched including looking in hidden data such as small text, hidden ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Mix of Frameworks and GRC Satisfy Compliance Overlaps
Three organizations reveal how they use a combination of frameworks such as COBIT or ISO 27001 along with GRC tools satisfy overlapping industry and federal regulatory demands.
-
Enterprise Security of Microsoft SQL Server 2008 Improves Over Other Versions
New protections in SQL Server 2008 include granular data security features such as encryption, key management and meta data security enhancements. There is also increaded flexibility in role-based permissions that tighten database controls.
-
Sophos Endpoint Security and Control 8.0 product review
Sophos Endpoint Security and Control 8.0 is a comprehensive endpoint security product, offering antivirus, antispyware, host intrusion prevention, firewalling, application control, device control, and network access control.
-
Product Review: Workshare Protect Premium 6.0
Workshare Protect Premium 6.0 seeks to eliminate the malicious or accidental leakage of sensitive corporate data.
-
Product review: AirDefense Enterprise 7.3
AirDefense's AirDefense Enterprise 7.3, a wireless intrusion detection and intrusion prevention tool, has new features including support for Power over Ethernet (PoE) for its sensors, a new user interface, overhauled reporting and new features such as WEP cloaking, advanced forensics, spectrum analysis and a centralized console to manage appliances.
-
Mix of Frameworks and GRC Satisfy Compliance Overlaps
-
-
Companies Finding a Place for Maturing NAC Projects
Four case studies examine how network access control (NAC) projects are faring in the enterprise, and how they're helping with device discovery and policy enforcement, but remediation remains a challenge.
-
Product Review: Altor Networks' Virtual Network Security Analyzer (VNSA) 1.0
The effectiveness of Altor Networks' Virtual Network Security Analyzer (VNSA) 1.0 remains an Achille's Heel, especially for companies with a large number of virtual machine deployments.
-
TechFocus
Central Control
-
Security Services: Symantec Online Fraud Protection
Symantec's Online Fraud Protection service includes an initial on-site assessment, phishing and transaction monitoring, incident response, monitoring of malware targeting the company's brand and analysis of new malware behavior.
-
Companies Finding a Place for Maturing NAC Projects
-
Columns
-
Shared Identity Providers Could Soothe Password Chaos
A security model that requires people to remember multiple passwords and logins has to change.
-
Interview: Bill Jiminez, Systems Architect at the University of the Pacific
Rolling out access controls such as NAC and password-management systems providedsome key lessons for dealing with reluctant users.
-
GRC: Over-Hyped or Legit?
Governance, risk and compliance (GRC) is being used as a catch-all phrase for most information security strategies and tagged onto various products, adding even more confusion in the market as to what it truly means or promises to corporations.
- Viewpoint: Vulnerability researchers doing more than 'search'
-
Security Certifications' Ethics Programs Merely Window-Dressing
Professional information security organizations' efforts to improve their ethics programs only dress up an ugly situation.
-
Shared Identity Providers Could Soothe Password Chaos
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO