Access "Recent Releases: Security product briefs, November 2006"
This article is part of the November 2006 issue of Symantec 2.0: Evaluating their recent acquisitions
@exb @exe GFI MailSecurity 10 GFI Software Price: Starts at $500 for 25 mailboxes, plus additional charges for optional Grisoft, McAfee and Kaspersky antivirus GFI Software's GFI MailSecurity 10 features a new antivirus engine, Grisoft AVG and RSS quarantine feeds, providing more convenient quarantine monitoring. The addition of Grisoft AVG brings the number of virus-scanning engines in the product to five, with BitDefender, Kaspersky, McAfee and Norman. Its Trojan & Executable Scanner detects unknown malicious executables by analyzing what an executable does. GFI MailSecurity 10 can also protect proprietary information by scanning for information leaks. VolumeShield AntiCopy Enterprise Edition 2.0 BBS Technologies Price: Starts at $19.95 per workstation VolumeShield AntiCopy Enterprise Edition 2.0 protects computers from data theft by blocking the unauthorized use of portable storage devices and removable media. Key features include complete access lockdown and password-protected access to portable storage and media-writing devices; auditing of Firewire and... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
New business opportunities feed appetite for managed VPN services
Neil Roiter explores secure remote access possibilities.
- Viewpoint: Three cheers for free and open source software
- Events: Information security conferences for November 2006
-
SPI Dynamics' WebInspect 6.1 Product Review
Defend against Web application attacks and improve security. Learn about SPI Dynamics' WebInspect 6.1 product installation, configuration and reporting.
-
Security information management review: Network Intelligence's enVision
A review of SIM product: Network Intelligence's enVision
-
Recent Releases: Security product briefs, November 2006
Read about security products released in November 2006.
-
Auditing/Compliance
Consul Risk Management's InSight Suite v7
-
Business Survival 101: How to Perform a Business Impact Analysis
by Ed Moyle, Contributor
A business impact analysis can be a manual that helps your company weather disasters.
-
Symantec 2.0
by Dennis Fisher
John Thompson and Symantec are staking their claim as one of Silicon Valley's leading innovators. Will they succeed?
-
New business opportunities feed appetite for managed VPN services
-
-
Intrusion Detection: Arbor Networks' Peakflow X 3.6
Arbor Networks' Peakflow X 3.6
-
Digital Rights Management: SealedMedia's Enterprise DRM 5.0
SealedMedia's Enterprise Digital Rights Management 5.0
-
More Than Meets the Eye
You may think you're guarding your assets, but malicious insiders are using steganography to slip closely guarded company secrets out of your organization.
-
Voltage SecureMail Desktop product review
Product review of Voltage Security SecureMail Desktop email encryption security tool pricing, cost, setup, configuration and password policy features.
-
Symantec unveils Security 2.0 initiative
by Bill Brenner, Senior News Writer
As part of Security 2.0, Symantec unveiled new products and partnerships with VeriSign and Accenture to help customers secure their databases, manage risk and fight ID theft.
-
Security Service Provider Product Review: MessageLabs, Postini
Get the latest news on managed security service providers MessageLabs and Postini products. Pricing information, URL filtering, malware protection and other features are discussed.
-
Secure Reads: The Security Risk Assessment Handbook
Read a quick review of The Security Risk Assessment Handbook.
-
Optical network security: Inside a fiber-optic hack
Fiber-optic networks aren't hack-proof: A savvy attacker can crack them with ease.
-
Intrusion Detection: Arbor Networks' Peakflow X 3.6
-
Columns
-
Editor's Desk: The ultimate insider threat
Walk the Line
-
Perspectives: Pandemic planning for remote access
Shared infrastructure, such as power and water, must be operating, otherwise, enterprise business continuity plans in the event of a pandemic are useless.
-
Ping: Avi Rubin
Avi Rubin
-
Face-Off: Schneier, Ranum debate security regulations
Do federal security regulations help?
-
Editor's Desk: The ultimate insider threat
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO