A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.
From smarter criminals to network access protection, IT is going to have its hands full in 2007.
Significant changes in CA products are worth a look
Symantec Corp. is first out of the gate to announce companion products to Microsoft’s updated Exchange Server 2007
Options for notification and remediation, as well as NAC integration techniques and technologies.
For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.
Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.
IT needs to adopt a multi-step approach—moving from denial to active management—and address enterprise IM use.
A new product provides enterprises with a risk assessment analysis that keeps everyone informed.
New study shows disconnect between executives' understanding and action
New IBM initiatives target hackers and insider threats in a single, complete security platform.
Guarding against external threats is important, but don’t overlook legacy systems security.
If you’re only as secure as your weakest link, printers could be your biggest threat.
To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.
Three key features IT should look for when shopping for a UTM solution.
A new encryption solution promises to keep employees honest and reduce the number of enterprise "insiders."
Protecting mission-critical data means looking at port and USB vulnerabilities.
EdgeSecure makes it easier to protect data stored in remote locations.
Broken lock: $25. Stolen laptop: $1,500. The cost of corporate data breach: Priceless. Learn how to deploy resources and leadership to most effectively deal with the aftermath of sensitive data exposure.
V.i. Laboratories promises that CodeArmor can application code from piracy and reverse engineering