119 results on '"Security software -- Evaluation"'
Search Results
2. Beyond basic VPNs: As VPN technology matures, feature sets are expanding. But, there are still significant differences among the competing products
3. Security protocols and performance
4. NT Firewalls: Tough enough
5. VPNs: security with an uncommon touch
6. Firewall software for NT and Unix
7. Firewalls set networking arena ablaze
8. Firewalls: don't get burned
9. Token authentication: the safety catch
10. Virus-prevention NLMs: seven convenient and effective programs that defend against the threat of computer viruses
11. UNIX and Microsoft single sign-on
12. The flip side of fear: Sanctum's AppScan picks up where social engineering and firewalls leave off, helping to soothe your Web site's heebie-jeebies with solid security measures. (hello, world!)
13. Signature recognition makes it mark
14. The Move To Web 2.0 Increases Security Challenges; As more companies deploy cool Web 2.0 technologies, careful planning is required to avoid new kinds of security problems
15. Probing Questions -- The bad guys want in. So is host-intrusion-prevention advanced fortification for your systems or just another agent to manage?
16. Attacknophobia -- Web app queries can wield a deadly bite. Consider a Layer 7 firewall to harden your network
17. How Bad Is Intrusion Detection?
18. 802.1x Enables Comply or Deny For PCs -- An authentication protocol originally aimed at the LAN finds new life as the foundation for host policy enforcement
19. Web Application Security For All -- New Web application security products are packaging the expertise of consultants into software tools and appliances
20. Security -- The security target for 2005? Centralized management and multilayer protection
21. There Is Intelligent Life On Protego's New Security Appliance, PN-MARS
22. Rid your system of spyware -- Two easy-to-use programs do the trick in just minutes
23. Guarding the Jewels Where They Lie
24. Server Shields -- Each HIP product we tested protected our unpatched servers from every nasty bit of code we threw at them. for its policy creation, price and feature sets, Cisco security agent landed our editor's choice award
25. Product Pick
26. QVision Keeps Eye On All Network Activity
27. Lab Test: Identitity Management Suites; Guidelines for implementing identity management technology, along with a side-by-side comparison of leading identity management suites from Novell, Courion, and Computer Associates
28. Security Information Management Product Review; We tested six SIM tools and found that, for the most part, they deliver on their promises -- for a price
29. Check Point Goes The Extra Mile To Secure Networks
30. CONTROLLING CONTENT BRINGS PROFIT -- Content filtering brings technical and political challenges that companies and solution providers must face
31. Protecting Your Customers' Networks From Intruders -- Products hold promise of recurring revenue streams
32. Application-level Firewalls: Smaller Net, Tighter Filter -- Secure Computing's Sidewinder G2 slithers to victory, with its improved implementation and superior performance
33. WebInspect Detects Site Defects -- SPI Dynamics' software goes beyond security patches
34. PROXIES ADD A PROTECTIVE SHIELD -- Web security proxies-aka, Web application firewalls-can detect and mitigate common attacks, but configuration is crucial. Kavado InterDo and Sanctum AppShield ran neck-and-neck, but AppShield captured the top spot-for now
35. Defense Starts Here -- Deep inside the perimeter, your desktops and laptops are vulnerable. Desktop firewalls can protect your endpoints
36. A Recipe For Success: 2002 Product Of The Year Awards -- CRN Test Center picks 10 products that set new standards of excellence for the channel
37. Reader Review: McAfee.com SpamKiller; A reader writes in with a detailed assessment of McAfee.com's anti-spam software. The upshot: It's a polished product that lacks some key features and doesn't automate enough functions
38. PremierAccess Heads a Pedestrian Pack -- Secure Computing's unified authentication-management system walked off with our Editor's Choice award by offering a solid foundation for implementing policies, but you'll have integration work cut out for you no matter which route you take
39. Improvements tighten Lucent's Security Management Server
40. APPSHIELD INSPECTS AND PROTECTS YOUR WEB APPS FROM HTTP TO Z
41. Mandrake Single Network Firewall 7-2
42. Vendors leave room to improve partner loyalty, satisfaction ratings
43. DRAGON CLAWS ITS WAY TO THE TOP -- The Bruisernet took a beating, and so did we. Putting our IDSes to the test caused information overload, but Enterasys' solution slid into the Editor's Choice spot, with Cisco's offering and Snort hot on its trail
44. PGP Admin and Desktop Security for Windows
45. Check Point Next Generation: FireWall-1 Gets a Forklift
46. SurfinShield Protects Enterprises From New Threats
47. Firewalls Make The Grade
48. AUTHENTICATION GETS TOUGH -- It's not enough to allow access to your servers with a password. A large and growing Web presence demands a scalable, secure, manageable authorization and authentication package
49. OBLIX NETPOINT 4.6 LETS THE CUSTOMERS IN BUT KEEPS THE BAD GUYS OUT
50. LAN LOCKED -- Tiny Software's Personal Firewall protects your internal network from outside exposure
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.