Search

Your search keyword '"Security software -- Evaluation"' showing total 119 results

Search Constraints

Start Over You searched for: Descriptor "Security software -- Evaluation" Remove constraint Descriptor: "Security software -- Evaluation" Publisher united business media llc Remove constraint Publisher: united business media llc
119 results on '"Security software -- Evaluation"'

Search Results

2. Beyond basic VPNs: As VPN technology matures, feature sets are expanding. But, there are still significant differences among the competing products

4. NT Firewalls: Tough enough

5. VPNs: security with an uncommon touch

6. Firewall software for NT and Unix

7. Firewalls set networking arena ablaze

8. Firewalls: don't get burned

9. Token authentication: the safety catch

10. Virus-prevention NLMs: seven convenient and effective programs that defend against the threat of computer viruses

11. UNIX and Microsoft single sign-on

13. Signature recognition makes it mark

14. The Move To Web 2.0 Increases Security Challenges; As more companies deploy cool Web 2.0 technologies, careful planning is required to avoid new kinds of security problems

17. How Bad Is Intrusion Detection?

18. 802.1x Enables Comply or Deny For PCs -- An authentication protocol originally aimed at the LAN finds new life as the foundation for host policy enforcement

23. Guarding the Jewels Where They Lie

24. Server Shields -- Each HIP product we tested protected our unpatched servers from every nasty bit of code we threw at them. for its policy creation, price and feature sets, Cisco security agent landed our editor's choice award

25. Product Pick

26. QVision Keeps Eye On All Network Activity

27. Lab Test: Identitity Management Suites; Guidelines for implementing identity management technology, along with a side-by-side comparison of leading identity management suites from Novell, Courion, and Computer Associates

28. Security Information Management Product Review; We tested six SIM tools and found that, for the most part, they deliver on their promises -- for a price

29. Check Point Goes The Extra Mile To Secure Networks

30. CONTROLLING CONTENT BRINGS PROFIT -- Content filtering brings technical and political challenges that companies and solution providers must face

31. Protecting Your Customers' Networks From Intruders -- Products hold promise of recurring revenue streams

32. Application-level Firewalls: Smaller Net, Tighter Filter -- Secure Computing's Sidewinder G2 slithers to victory, with its improved implementation and superior performance

34. PROXIES ADD A PROTECTIVE SHIELD -- Web security proxies-aka, Web application firewalls-can detect and mitigate common attacks, but configuration is crucial. Kavado InterDo and Sanctum AppShield ran neck-and-neck, but AppShield captured the top spot-for now

35. Defense Starts Here -- Deep inside the perimeter, your desktops and laptops are vulnerable. Desktop firewalls can protect your endpoints

36. A Recipe For Success: 2002 Product Of The Year Awards -- CRN Test Center picks 10 products that set new standards of excellence for the channel

37. Reader Review: McAfee.com SpamKiller; A reader writes in with a detailed assessment of McAfee.com's anti-spam software. The upshot: It's a polished product that lacks some key features and doesn't automate enough functions

38. PremierAccess Heads a Pedestrian Pack -- Secure Computing's unified authentication-management system walked off with our Editor's Choice award by offering a solid foundation for implementing policies, but you'll have integration work cut out for you no matter which route you take

39. Improvements tighten Lucent's Security Management Server

40. APPSHIELD INSPECTS AND PROTECTS YOUR WEB APPS FROM HTTP TO Z

41. Mandrake Single Network Firewall 7-2

42. Vendors leave room to improve partner loyalty, satisfaction ratings

43. DRAGON CLAWS ITS WAY TO THE TOP -- The Bruisernet took a beating, and so did we. Putting our IDSes to the test caused information overload, but Enterasys' solution slid into the Editor's Choice spot, with Cisco's offering and Snort hot on its trail

44. PGP Admin and Desktop Security for Windows

45. Check Point Next Generation: FireWall-1 Gets a Forklift

46. SurfinShield Protects Enterprises From New Threats

47. Firewalls Make The Grade

48. AUTHENTICATION GETS TOUGH -- It's not enough to allow access to your servers with a password. A large and growing Web presence demands a scalable, secure, manageable authorization and authentication package

49. OBLIX NETPOINT 4.6 LETS THE CUSTOMERS IN BUT KEEPS THE BAD GUYS OUT

50. LAN LOCKED -- Tiny Software's Personal Firewall protects your internal network from outside exposure

Catalog

Books, media, physical & digital resources