Network Security Software Research
-
GFI EventsManager
Sponsored by: GFI SoftwareGFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.
-
The Need for Effective Event Management
Sponsored by: GFI SoftwareThis paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.
-
CORE IMPACT 6.0
Sponsored by: Core Security TechnologiesFor organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.
-
Pod Slurping - An Easy Technique for Stealing Data
Sponsored by: GFI SoftwareIn this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
-
Managing Your Network Security with Juniper Networks Flash Demo
Sponsored by: Juniper Networks, Inc.Take a tour of the Juniper Networks NetScreen-Security Manager to see how you can manage integrated FW/VPN devices.
-
The Self-Defending Network
Sponsored by: Cisco Systems, Inc.Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
-
Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks
Sponsored by: Cisco Systems, Inc.Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.
-
Penetration Tests
Sponsored by: Internet Security Systems, Inc.A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.