Security Software Research
-
Symantec Protection Suite Enterprise Edition
Sponsored by: Symantec CorporationSymantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
The Value of Integrated Security
Sponsored by: Cisco Systems, Inc.Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
-
Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
Sponsored by: Symantec CorporationThis presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
-
Data Loss Prevention Survey
Sponsored by: Symantec CorporationTake this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
-
Control Compliance Suite Trialware
Sponsored by: Symantec CorporationControl Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
-
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
Sponsored by: Symantec CorporationWith this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
-
Web Application Security: Automated Scanning versus Manual Penetration Testing
Sponsored by: IBMThis paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
-
Core IMPACT Essential
Sponsored by: Core Security TechnologiesHow do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help.
-
Stopping data leakage: Exploiting your existing security investment
Sponsored by: SophosThis paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
-
Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges
Sponsored by: LumensionRead this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
-
Products of the Year 2006
Sponsored by: Information Security MagazineAs spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.