PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
September 2007


VIRTUALIZATION BufferZone Enterprise REVIEWED BY GREG BALAZE TrustWare Price: Starts at $2,899 per 100 licenses With the information security field seemingly saturated with every possible appliance and software, it would seem there's little room for an innovative approach. TrustWare's BufferZone belies that notion. TrustWare's BufferZone works by quarantining suspect or restricted applications, creating a protected environment for each Web- or network-based application, such as Web browsers, IM, email and P2P applications, preventing viruses or malware from entering and affecting the rest of the workstation. Configuration/Management B   Instead of designing a management console, BufferZone relies on Microsoft's native Group Policy Objects to manage and deploy BufferZone and its installation file. This allows easy integration with Active Directory and reduces the learning curve, through a group policy template that uses the familiar management console (MMC). Simply copy the administration file to the c:windowsinf directory and ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Rootkit detection and removal know-how

    Get advice on how to detect malware and rootkits and the best ways to achieve rootkit removal and prevent hacker attacks.

  • What CISOs need to know about computer forensics

    With computer forensics needed for civil litigation, human resources investigations and criminal cases, organizations need to ensure they're prepared and evidence is preserved. This feature details steps involved in computer forensics, common missteps, and forensics resources.

  • Logical, physical security integration challenges

    Integrating physical and IT security can reap considerable benefits for an organization, including enhanced efficiency and compliance plus improved security. But convergence isn't easy. Challenges include bringing the physical and IT security teams together, combining heterogenous systems, and upgrading a patchwork of physical access systems.

  • Consolidation's impact on best-of-breed security

    Standalone security vendors are attractive targets for large infrastructure players such as EMC. This feature looks at the consolidation in the security market and the potential for best-of-breed security to eventually disolve into a mashup of suites and services by big vendors like EMC, IBM, Microsoft, and HP.

  • SIM and NBA product combination is powerful

    The recent announcement that Mazu Networks, a provider of network-based analysis (NBA) tools, and eIQnetworks, a supplier of SIM products, underscores the trend towards convergence in the NBA and SIM markets. The value proposition is clear: two useful network/security data analysis tools in one integrated package.

  • Intrusion Prevention: Stonesoft's SGI-2000S IPS

    SGI-2000S IPS

Columns in this issue