In the end, a network’s security is only as good as the people who use it. Tools like these will help ease administrator’s jobs some by providing reporting and logging of user activity and the programs they try to run. All the tools in the world, however, will not prevent a user from copying files to a PC or installing an unapproved application. The enterprise must establish an acceptable use policy for the network and enforce it.
Spyware attacks are only going to continue to gain in frequency and cleverness. Unlike viruses, spyware and adware have a financial goal driving them, and you can bet those spyware writers are doing everything they can to access your network. Make sure you make their job even harder.
Overall Score (100%)
|Computer Associates eTrust PestPatrol Anti-Spyware Corporate Edition r5||7.0||9.0||8.0||6.0||7.0|
|Eset NOD32 2.5 Antivirus System||7.0||7.0||7.0||9.0||7.0|
|F-Secure Anti-Virus Client Security 6||9.0||9.0||10.0||9.0||8.0|
|LANDesk Security Suite 8.6||8.0||8.0||9.0||10.0||8.0|
|McAfee VirusScan Enterprise 8.0 with Anti-Spyware Enterprise Module 8.0||8.0||8.0||8.0||10.0||8.0|
|Sunbelt CounterSpy Enterprise 1.5||9.0||9.0||8.0||9.0||9.0|
|SurfControl Enterprise Protection Suite - Enterprise Threat Shield||8.0||9.0||8.0||8.0||9.0|
|Tenebril SpyCatcher 4.0 Beta|
|Trend Micro Anti-Spyware for Small and Medium Business 3.0||8.0||9.0||8.0||8.0||8.0|
|Webroot Spy Sweeper Enterprise 2.5||8.0||9.0||9.0||8.0||9.0|
Having trouble installing and setting up Win10? You aren’t alone. Here are many of the most common...
It's all about knowing how to build an open source community -- plus experience running applications in...
Win7 Update scans got you fuming? Here’s how to make the most of Microsoft’s 'magic' speed-up patch
From blockchain to SDN to container management, these rookies made big waves in open source
Working with functional programming requires a shift in your thinking, but has benefits in productivity...
Enterprises know the ability to adapt quickly is essential, but can that agility extend to the core,...
Crypto experts agree it's time to ditch SHA-1 if you haven't already, but also to know where the real...