Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Recent Releases: Security product briefs, March 2006

Read about the security products that launched in March 2006.

This article can also be found in the Premium Editorial Download: Information Security magazine: Captive to SOX compliance? A compliance guide for managers


@exe NetIQ Risk and Compliance Center maps security data drawn from the NetIQ Vul-nerability Manager to a number of regulations, and delivers highly flexible views and assessments to give managers and auditors a look at how their enterprise is scoring in terms of compliance. The policies are highly customizable, and organizations can choose the appropriate framework--including COBIT and 17799. The compliance/risk score is based on factors including severity and the value assigned to the asset.

NetIQ Risk and Compliance Center starts at $40,000.

Postini Archive Manager builds on the company's portfolio of e-mail security, compliance and management services, providing for the capture, storage, discovery and deletion of e-mail and instant message traffic. The managed service handles long-term storage of electronic communications and provides secure, controlled access for search and retrieval of messages. Companies can define policy across groups, users and protocols through a central management console.

Postini Archive Manager starts at $160 per user per year.

eEye Digital Security's REM 3.0 Security Management console gives enterprises the ability to assess and manage vulnerabilities at event, asset or process level and take action immediately across their entire network. REM 3.0 is part of the Enterprise Risk Management Suite, which includes the Retina vulnerability assessment scanner and Blink endpoint security product, providing centralized management for both.

REM 3.0 starts at $4,995.

Check Point Software Technologies' Safe @Office 500 and Safe@Office 500W are integrated security appliances de-signed to protect small businesses. Each appliance features a firewall, VPN, anti-virus, intrusion prevention, traffic shaping and Web filtering. The Safe@Office 500W integrates a 108Mbps extended range wireless access point with wireless security and guest hotspot capabilities. Safe@Office 500 is based on the new Check Point Embedded NGX 6.0 platform based on Check Point's Fire-Wall-1 and VPN-1.

Safe@Office 500 starts at $224.99, Safe@Office 500W at $343.50.

Titus Labs' suite of products provides e-mail classification, retention for compliance and policy enforcement. Message Classification provides classification and policy enforcement for Microsoft Office Outlook, allowing users to manage the classification, distribution and retention of corporate e-mail. Message Rights includes the restricted distribution of sensitive e-mail. Rights Gateway is a server-based classification enforcement tool designed to ensure that classified information does not leave the company.

Pricing is $22.95 per user for Message Classification; $32.95 per user for MessageRights; and $2,995 plus $17.95 per user for Rights Gateway.

Senforce Technologies Endpoint Security Suite (ESS) 3.1 can perform integrity and security compliance checks at any time and place on the corporate network, including antivirus and antispyware and patches. Its firewall includes stateful packet inspection, content filtering, and remote host access control lists to protect PCs. Wireless and VPN security is enforced as well in the endpoint security product. ESS can also enforce policy restricting use of portable storage devices.

ESS starts at $69 per user.

SecureWorks' managed intrusion prevention service now includes dynamic protocol recognition to determine the actual type of traffic, regardless of port used; enhanced protection against threats directed at desktops, such as Trojans, worms and spyware; and DDoS protection against SYN floods in its iSensor V5.

Pricing for SecureWorks' intrusion prevention services ranges from $295 to $3,750 per month.

This was last published in March 2006

Dig Deeper on Information security policies, procedures and guidelines

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.