Information Security

Defending the digital infrastructure


Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Recent releases: Security product briefs, June 2006

Learn about the security products released in June 2006.



Fidelis Security Systems' DataSafe 3.9 prevents the unauthorized network transfer of critical or sensitive information across all channels on gigabit-speed networks, including e-mail, http, Web mail, FTP, instant messaging and peer-to-peer communications. The latest version includes prebuilt policies and an improved interface. DataSafe's port- and protocol-independent architecture enables fast implementation and all-channels prevention without change to desktops, servers or network devices.

Pricing starts at $65,000 per sensor.

Insightix's Enterprise Collector 2.0 continuously monitors the network and provides a complete inventory of all network elements. It tracks in real time all the elements that are currently and previously connected to the network. Security managers can be alerted as elements reconnect to the network, improving unauthorized device detection, and configuration, asset and patch management.

Pricing begins at $4,000, based on the number of elements on the network.

Avinti's iSolation Server 2.1 creates a virtual machine to test suspect e-mail to identify and defend against Trojans, keyloggers and other malware before they steal sensitive data. It provides detailed reports on blocked unknown malicious messages, improved throughput of up to a half-million messages per day per server and an active content SMTP mail filter that strips out active, potentially dangerous content from HTML e-mail.

Pricing is based on a per mailbox license, with a suggested retail price starting at $12.50 per mailbox.

PacketMotion's PacketSentry tracks who's doing what with data and applications on the network. Its identity-centric view combines real-time analysis with business understanding, enabling companies to enforce business and security policies. PacketSentry supports a wide range of internal security functions including investigative forensics and compliance auditing. Its Virtual Proxy Engine analyzes and interprets complete conversations while storing only critical data.

Pricing starts at $50,000.

MarkMonitor's Phishing Readiness and Response, the latest addition to its comprehensive fraud prevention product line, is designed for smaller financial institutions that, until now, have been phished infrequently or have limited in-house resources to address online fraud. With this offering, organizations are able to have escalation and operational procedures in place in the event of an attack. The solution also provides MarkMon-itor's Early Warning System, which automatically alerts financial institutions of potential phishing sites before they become operational.

Typical cost is between $20,000 and $30,000.

NeoScale Systems' CryptoStor KeyVault is an open security key management system that delivers centralized management of both NeoScale encryption appliance keys and those from third-party storage encryption vendors. CryptoStor KeyVault automates life-cycle activities to eliminate any chance of failure. Users decide when and where keys should be made available, and create trust relationships to automate their decisions.

CryptoStor KeyVault starts at $25,000.

Verizon Business' Hosted Secure Instant Messaging Service comprises two options: Enterprise Instant Messaging is designed for companies that need a complete and secure IM communications service that operates only within their networks. This offering uses Microsoft Office Communi- cator 2005 software to make IM safer for companies by encrypting "chat" between users. Managed Public Instant Messaging is designed for companies that use public IM systems such as MSN, Yahoo! and AOL. The service allows companies to determine which individuals can access specific IM networks.

Enterprise IM starts at $5.95 per user per month.

Article 6 of 15

Dig Deeper on Email and Messaging Threats-Information Security Threats

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All