Access "Recent Releases: Security product briefs, December 2005"
This article is part of the December 2005 issue of Top forensics tools for tracking down cybercriminals
Vontu's Vontu 5.0, which combats insider data theft, has been updated with automatic enforcement of data policies and encryption functionalities. Included in this version are Discover, which detects and reports where confidential data lives on the network; Monitor, which checks for confidential data leakage over e-mail, IM and Web channels; Prevent, which stops data loss; and Enforce, which automatically checks data security policies and compliance efforts. Vontu 5.0 starts at $100,000. Cymtec Systems' Cymtec Sentry stops the propagation of network threats. Sentry blocks potential threats and minimizes the damage caused by outbreaks with its Advanced Heuristic Traffic Analysis engine. Using its Web-based management system, it can detect which hosts are infected or have violated policies, and can identify vulnerable network points. Cymtec Sentry starts at $3,995, with a monthly subscription of $130. DeepNines Technologies' Security Edge Platform (SEP) 4.0, a converged security appliance, is deployed in front of the router or at critical network points. It ... Access >>>
Premium Content for Free.
Building A Perimeter Defense With Application-Level Firewalls
Learn how application level firewalls, when carefully deployed, can build perimeter defenses and prevent hackers from exploiting vulnerabilities, such as application code, to achieve attacks.
To Catch a Thief
Forensics tools aren't only used in high-profile cases.
On the Mend
Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.
Recent Releases: Security product briefs, December 2005
Learn about the security products released in December 2005.
Controlling the Uncontrollable
Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.
Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.
- Building A Perimeter Defense With Application-Level Firewalls
Hot Pick: Citrix Systems' Citrix Access Essentials
Citrix Systems' Citrix Access Essentials
SSL VPN: Array Networks' Array SPX5000
A review of Array Networks' Array SPX5000
Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7
Configuresoft's ECM v4.7
Application Security: Cenzic's Hailstorm v2.6
Cenzic's Hailstorm v2.6
Secure Reads: Mergers and Acquisitions Security
Read a review of the security book Mergers and Acquisitions Security.
- Hot Pick: Citrix Systems' Citrix Access Essentials
On The Radar: Security technology can't solve process problems
Perspectives: History teaches security lessons well
Expert Richard Bejtlich looks at the lessons learned in engineering disasters and applies them to information security.
Editor's Desk: Security for the corporate brand
Know Thy Business
Ping: Desiree Beck
- On The Radar: Security technology can't solve process problems
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...