More from SearchSecurity -- November 2005

Highlights from the November 2005 issue of Information Security magazine.



Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.


On the Line
Combining high-performance traffic inspection with automated response capabilities, IPS allows organizations to respond quickly to threats and monitor the huge volume of high-speed traffic entering their networks. In this issue, we compared five leading inline IPS appliances from Cisco Systems, ISS, Radware, Sourcefire and Top Layer. Now, learn more about the keys to successful intrusion detection and prevention in this learning guide. It features insight into the technology, how it works, and advice for troubleshooting and configuring your IDS/IPS.

>> GET THE IDS/IPS LEARNING GUIDE


Products of the Year

Help us name information security's Products of the Year. Take our brief surveys to let us know how satisfied your organization is with its security products. The overall results will appear online soon.

Threat and Vulnerability Management Products of the Year

Authentication and ID Management Products of the Year

Content Security Products of the Year

Aerial View
This month's feature showed you the ways that organizations can leverage vulnerability management processes and tools to reduce security exposures and demonstrate security's value to the business. Now, arm yourself with information about the types of correlation tools that offer the best value. Register for an hour-long webcast on Nov. 30 with Burton Group analyst Diana Kelley. She'll explain:

  • How native tools are expanding to become more comprehensive solutions
  • The range of tools taxonomies, including vulnerability and remediation management, threat management, patching and change management, security event and information management, and systems management
  • How to select what's right for your business
  • >> PREREGISTER FOR THE WEBCAST




    Katrina's Security Survivors
    As Hurricane Katrina hit, information security teams were scrambling to make sure their disaster recovery plans could withstand the storm's devastation. Information Security magazine profiled executives at three Gulf Coast businesses who worked tirelessly to keep their organizations up and running. Read the extended interviews with these security practitioners and find out the lessons they learned from Katrina.

    >>CLICK TO READ THE PING WITH TIM OZMUN
    >>CLICK TO READ THE PING WITH JENNIFER CREGER
    >>CLICK TO READ THE PING WITH BILL DERWOSTYP

    RELATED INFORMATION:

    >> CLICK TO READ "NEW ORLEANS CIO: IT WAS THE WILD, WILD WEST"
    >> CLICK TO READ "NEW ORLEANS CIO: VOIP, PORTALS AND KATRINA"



    E-mail Security Decisions

    Attend this FREE seminar in the city of your choice -- Boston, Toronto or Chicago -- and gain proven infrastructure hardening techniques combined with practical strategies focused on the most urgent e-mail security threats (phishing, spyware, denial of service attacks and more). With four key sessions, this intensive 1-day training event guarantees unbiased expertise without any vendor spin from the podium. You gain little-known e-mail security tips, tactics and techniques from two of the industry's leading e-mail security authorities, Dr. Joel Snyder and Lee Benjamin.
    HIGHLIGHTS ARCHIVES
    October 2005
    September 2005
    August 2005
    July 2005
    June 2005
    May 2005
    April 2005
    This was first published in October 2005

    Dig deeper on Security Industry Market Trends, Predictions and Forecasts

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close