A new exploit potentially lets an attacker execute code on a user’s machine
PGP Corporation may have the handle on protecting sensitive data everywhere
Information protection has transformed from protecting the network to protecting the information -- wherever it resides.
With a little prioritization, setting up a network security plan doesn't have to eat up all your time.
SIM adds real-time capabilities but compliance, not threats, stills drives this market
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
With the data inside the data center secured, IT must now address the problems of a growing mobile work force. We discuss how enterprise data protection has changed and where it’s headed.
IBM is pushing a retro database security model: bring it all back home to the mainframe, and trust the security and privacy of Big Iron
A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.
A look back at this year’s security threats, predictions for 2007, and a low-cost way for any IT organization to protect data that requires no special equipment or software.
From smarter criminals to network access protection, IT is going to have its hands full in 2007.
Significant changes in CA products are worth a look
Symantec Corp. is first out of the gate to announce companion products to Microsoft’s updated Exchange Server 2007
For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.
Options for notification and remediation, as well as NAC integration techniques and technologies.
In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices
UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.
From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so