Issue OverviewInformation Security magazine - April 2005
In month’s Information Security magazine, ChoicePoint's Rich Baich sizzles in the incident response hot seat. You'll also learn about how United Airlines cut costs when rebuilding its network. We review Security Threat Manager 3.0, Kaspersky Anti-Virus Business Optimal 5.0 and Hive 3.0. Also inside: Get the inside scoop on risk dashboards, endpoint security and how to makeover an architecture. Finally, read a review of the book, The Executive Guide to Information Security: Threats, Challenges, and Solutions. Access >>>
Premium Content for Free.
Secure Reads: The Executive Guide to Information Security
Read a review of the book, The Executive Guide to Information Security: Threats, Challenges, and Solutions.
Security information management review: Security Threat Manager 3.0
A review of Security Threat Manager 3.0
Hot Pick: Sentryware's HIVE 3.0
Evolving risk dashboards will tell how secure you are and when something's wrong.
Rights of Passage
Our tests found that most endpoint security products will enforce policy and network access. Their differences are in the details.
- Secure Reads: The Executive Guide to Information Security
Intrusion Prevention: Top Layer's Attack Mitigator IPS 5500
Attack Mitigator IPS 5500
Antivirus: Kaspersky Anti-Virus Business Optimal 5.0
Kaspersky Anti-Virus Business Optimal 5.0
Recent Releases: Security product briefs, April 2005
Learn about the information security products released in April 2005.
Ready For Takeoff
Cutting costs was the only way to keep United Airlines flying high. Rich Perez's answer was to rebuild the network.
ChoicePoint's Rich Baich faced the perfect storm: a huge security breach, intense media attention and a shareholder revolt. What he needed was an incident response plan to get him out of the hot seat.
- Intrusion Prevention: Top Layer's Attack Mitigator IPS 5500
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...