Access "Antimalware: Prevx's Prevx1"
This article is part of the December 2006 issue of What's your biggest information security concern?
ANTIMALWARE Prevx1 REVIEWED BY PETER GIANOCOUPOULOUS Prevx Price: Starts at $19 per seat for 10 seats @exb @exe Malware continues to assault our corporate desktops and laptops with rapidly emerging and varying threats. In this climate, behavioral detection tools like Prevx1 offer an extra layer of protection in the crowded endpoint security market. Prevx1's "signatures" are based on how malware behaves--not on an exact pattern match used in conventional products--which helps it detect variants and new malware threats. Policy Control C Prevx1 offers pretty standard policy controls. Various settings can be tweaked on the client side to fine-tune the detection of malware and its management, including when and how the agent scans the host system and how to handle specific events. The user can specify the protection mode of software (Basic, Pro or Expert) and manage any discovered suspect executables, including uploading them to the Prevx Web portal for analysis. Configuration/Management C+ Installation is a breeze. Prevx1 consists of a protection agent that sits... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Finding the best security testing tools for product evaluation
Learn how you can use new information security tools to examine security products and investments, such as IPS, firewall or VPN gateway.
-
Risk Management: Skybox Security's Skybox View 3.0
Read a security product review of Skybox Security's Skybox View 3.0.
-
Host-Based IPS
Third Brigade's Deep Security 4.5
-
Intrusion Detection: Lancope StealthWatch 5.5
Lancope's Lancope StealthWatch 5.5
-
Protect What's Precious
We asked and you answered: Insiders, information leaks, compliance and the bottom line are your front-and-center priorities for 2007.
- At Your Service: December 2006 managed services security news
-
Reconnex's iGuard v5 security tool review
by Tom Bowers, Contributor
Product review of Reconnex iGuard v5, a data protection security tool used for information leaks, compliance, perimeter security, traffic analysis and tracking.
-
Finding the best security testing tools for product evaluation
-
-
Security Products Latest Version Releases: CipherTrust, Infoblox
Get news on the latest version product releases; get setup, pricing and configuration info from vendors such as CipherTrust, Infoblox and Safend.
-
Secure Reads: Multimedia Fingerprinting Forensics for Traitor Tracing
Read a quick review of Multimedia Fingerprinting Forensics for Traitor Tracing.
-
Automated data classification drives security, storage convergence
Data classification products from a variety of startups are leading efforts to increase convergence of security, compliance and storage management.
-
Antimalware: Prevx's Prevx1
Prevx's Prevx1
-
Avoiding Audit Failure: Getting Advice on PCI Compliance Mistakes
Get advice from auditors on how to avoid audit failure and get PCI DSS compliant to prevent a security breach.
- Security 7, 'Best In Show' Shine
-
Security Products Latest Version Releases: CipherTrust, Infoblox
-
Columns
-
Editor's Desk: More threats and more dollars
Holiday Cheer or Fear?
-
PING: Bernard Donnelly
Read an interview with Bernard Donnelly, vice president of quality assurance for the Philadelphia Stock Exchange.
-
Perspectives: Lack of enforcement undercuts HIPAA
A lack of HIPAA enforcement makes physicians unwilling to change habits that threaten the security of data.
-
Layer 8: Security managers come into their own
Professional Progress
-
Editor's Desk: More threats and more dollars
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO