PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2007

How to tell if you need the help of security integrators and consultants

In this month's issue of Information Security magazine, find out the pros and cons of working with a security services company, how third-party consultants can help managers, how much it should cost and how to choose the right firm. Get the inside scoop on unified threat management (UTM) devices, which consolidate several network security functions into one product. We review Red Seal Security Risk Manager, Identity Engines' Ignition Server, eEye Digital Security's Blink Professional 3.0 and more.

Access this PRO+ Content for Free!

Features in this issue

  • SIMs maturing and suitable for mid-market

    Security information management systems (SIMs) tools have expanded with more capabilities such as active threat response. The broadening of the technology will provide security managers with a sharper view of their overall security posture.

  • Product review: nCircle Configuration Compliance Manager

    nCircle Configuration Compliance Manager brings policy compliance and secuirty management into one centralized software suite. It provides vulnerability scanning via third-party scanners such as Nessus. This product review rates the software's ease of installation, features and effectiveness.

  • Encryption key management blunders can render deployments useless

    Encryption sounds like an ideal way to protect data but key management, including accountability, training, and enforcement of password complexity, are challenging.

Columns in this issue

More PRO+ Content

View All