ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Software Research

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • Top Benefits of Symantec Protection Suite

    Sponsored by: Symantec Corporation

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  • The Value of Integrated Security

    Sponsored by: Cisco Systems, Inc.

    Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.

  • Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise

    Sponsored by: Symantec Corporation

    This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.

  • Data Loss Prevention Survey

    Sponsored by: Symantec Corporation

    Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.

  • Control Compliance Suite Trialware

    Sponsored by: Symantec Corporation

    Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.

  • IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4

    Sponsored by: Symantec Corporation

    With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: IBM

    This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • Core IMPACT Essential

    Sponsored by: Core Security Technologies

    How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.

  • Stopping data leakage: Exploiting your existing security investment

    Sponsored by: Sophos

    This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.

  • Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges

    Sponsored by: Lumension

    Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

  • Products of the Year 2006

    Sponsored by: Information Security Magazine

    As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.