Access "Perspectives: Suite Spot"
This article is part of the February 2007 issue of Tips for navigating the maze of global security regulations
All-in-one security suites offer an array of advantages versus best-of-breed. As a security professional, you want the best. All else being equal, why wouldn't you want the leading antivirus protection, perimeter firewall and antispam filtering? Your computer and network resources deserve nothing less and it will help you sleep better. The problem is that all else is not equal. For some companies, a suite of security products from a single vendor is a home run and offers many advantages over implementing separate, best-of-breed products from different vendors. One of the biggest factors in favor of unified threat management (UTM), or an all-in-one security suite, is money. We have limited budgets with which to secure and defend network resources. Purchasing a suite from a single supplier is typically cheaper than buying individual products by a substantial margin. Some vendors even include functionality such as antispam or antispyware at no additional cost, making the purchase of a separate solution seem frivolous. The economy of scale and the ability to ... Access >>>
Premium Content for Free.
Unified threat management: Fortinet's FortiGate 3600A
Fortinet's FortiGate 3600A
Unencrypted data at rest is data at peril.
New tools target ISPs to stop botnets
Security vendors are bringing the botnet fight to ISPs and carriers.
Intrusion Prevention: Juniper Networks' ISG 2000 with IDP
Juniper Networks' ISG 2000 with IDP
Endpoint Security: ScriptLogic's Desktop Authority 7.5
ScriptLogic's Desktop Authority 7.5
- At Your Service: February 2007 managed security services news
- Events: Information security conferences for February 2007
- Unified threat management: Fortinet's FortiGate 3600A
Security system products latest releases: Archsight, Finjan, Sophos
Get information, such as price, features, protection and support, on the most recently released versions of security products, such as Archsight logger and Sophos Security Suite.
Vulnerability scanning review: PatchLink's PatchLink Update 6.3
PatchLink's PatchLink Update 6.3
IPS by the Numbers
Choosing the right intrusion prevention technologies and products is a complex task, but following these six steps will make it simpler.
Information security blueprint for architecture and systems
A formalized security architecture diagrams how you should handle the changing threat and regulatory environments.
HIPAA privacy records and guidelines: How to achieve compliance
Learn how to achieve compliance with HIPAA certification and learn to avoid and fix risks with password security, privacy regulations, records, guidelines.
Cyber-Ark Enterprise Password Vault 4.0 product review
by Tom Bowers, Contributor
Product review of Cyber-Ark Enterprise Password Vault, a password management and security tool that manages passwords and controls privileged accounts.
Organizations sending data abroad must be prepared to comply with a slew of privacy and security regulations.
- Security system products latest releases: Archsight, Finjan, Sophos
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...