PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Security product and tools news and releases: Trend Micro, Citrix

@exb @exe WANScaler 8000 series, NetScaler 7.0 Citrix Price: WANScaler 8500 starts at $8,500, 8800 at $40,000; NetScaler 7.0 at $17,499 The WANScaler 8000 series of wide area network optimization solutions have dynamic multi-level compression technology with extended disk-based history that can improve application response times for branch office employees. The 7.0 release of the NetScaler SSL VPN improves scalability, application policy management, app availability and enhanced security, including enhanced management of access control lists, improved management and configuration, as well as VoIP and IM support. iPolicy Security Manager and Intrusion Prevention Firewalls 3.0 iPolicy Networks Price: $5,000 to $120,000 The latest iPolicy product release includes real-time vulnerability correlation with support for multiple vulnerability assessment scanners. It provides dynamic intrusion detection/prevention (IDS/IPS) actions and improved IDS/IPS accuracy, among several other new security capabilities. The release also introduces ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue