ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Research

  • GFI EventsManager

    Sponsored by: GFI Software

    GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.

  • The Need for Effective Event Management

    Sponsored by: GFI Software

    This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.

  • CORE IMPACT 6.0

    Sponsored by: Core Security Technologies

    For organizations that need to ensure the security of critical or sensitive systems, CORE IMPACT is a must-have tool. This Information Security Review examines CORE IMPACT and highly recommends it as an effective security device.

  • Pod Slurping - An Easy Technique for Stealing Data

    Sponsored by: GFI Software

    In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.

  • Managing Your Network Security with Juniper Networks Flash Demo

    Sponsored by: Juniper Networks, Inc.

    Take a tour of the Juniper Networks NetScreen-Security Manager to see how you can manage integrated FW/VPN devices.

  • The Self-Defending Network

    Sponsored by: Cisco Systems, Inc.

    Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.

  • Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks

    Sponsored by: Cisco Systems, Inc.

    Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.

  • Penetration Tests

    Sponsored by: Internet Security Systems, Inc.

    A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.