Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Security system products latest releases: Archsight, Finjan, Sophos

Get information, such as price, features, protection and support, on the most recently released versions of security products, such as Archsight logger and Sophos Security Suite.

This article can also be found in the Premium Editorial Download: Information Security magazine: Tips for navigating the maze of global security regulations



QRadar 5.2
Q1 Labs

Price: Starts at $37,000

The latest version of Q1's SIM/network behavior analysis product provides predefined templates for university, enterprise and ISP customers. Its specific settings for different deployments are used to provide environment-specific detection capabilities and reduce false positives. Auto-tuning uses the information it learns from the network for security rules.

Sophos Security Suite

Price: Starts at $55.10 per year for 25-49 users

Sophos Security Suite is an integrated security solution for small- to medium-sized enterprises, combining protection against viruses, spyware, adware, spam and unauthorized intrusion. It includes a client firewall and Sophos' host-based intrusion prevention technology, which examines computer programs before they run and identifies malicious patterns and characteristics to identify and block unknown malware and a client firewall. Gateway and messaging protection from spam, viruses and spyware is delivered by Sophos PureMessage, which scans all emails and Exchange message stores, protecting against new and unknown email-borne threats.

GreenBorder Pro 2.9.2
GreenBorder Technologies

Price: $49.95; $14.95 for SafeFiles option

GreenBorder Pro protects end users against malicious code by opening or running files, Web mail attachments and downloaded programs automatically in a protected environment transparent to the user. The newest version includes support for Firefox. Users can employ existing desktop applications to downloaded files in complete safety, and can safely go to any Web site, click any link, use any Firefox extension or plug-in, and view or open any downloaded content.

Mobile Guardian Enterprise Edition 5.2
Credant Technologies

Price: Starts at $85 per device

The latest version of Credant's flagship product offers several new capabilities: The CMG Shield supports Cisco Systems' Network Admission Control (NAC) to protect the enterprise against unauthorized or unsecured PCs entering the corporate network--if a CMG Shield is not installed, NAC will identify them as noncompliant devices; over-the-air Sync Control for Microsoft Exchange Server detects and blocks any non-CMG Shield handheld mobile device from downloading business email.

Vital Security v8.4

Price: $15,000 for 1,000 users

This version of Vital Security extends Finjan's behavior-based security technology, guarding corporate networks from new and unknown types of malicious threats. Enhancements allow network and security executives to integrate, configure, manage and maintain the solution more efficiently and easily, and alleviate the management burden. These enhancements come on top of the system's existing management functions, such as flexible rule-based creation of security policies and X-ray mode, which allows an enterprise to test new rules on live traffic before they are actually enforced on the end user.

ArcSight Logger, ArcSight NCM

Price: ArcSight Logger, $75,000; ArcSight NCM, $50,000

ArcSight introduces two new products. ArcSight Logger is a log management appliance to provide a searchable, high-performance and cost-effective log data repository. It handles more than 60,000 events per second, and features device support for 170 products, as well as custom solutions. ArcSight Network Configuration Manager (NCM) optimizes and automates configuration changes across extended networks. ArcSight NCM automatically discovers network devices and can leverage data from existing network management applications already performing device discovery.

This was last published in February 2007

Dig Deeper on SIEM, log management and big data security analytics

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.