The InfoWorld Test Center assesses the readiness of 10 anti-spyware operatives for active enterprise duty
In the end, a network’s security is only as good as the people who use it. Tools like these will help ease administrator’s jobs some by providing reporting and logging of user activity and the programs they try to run. All the tools in the world, however, will not prevent a user from copying files to a PC or installing an unapproved application. The enterprise must establish an acceptable use policy for the network and enforce it.
Spyware attacks are only going to continue to gain in frequency and cleverness. Unlike viruses, spyware and adware have a financial goal driving them, and you can bet those spyware writers are doing everything they can to access your network. Make sure you make their job even harder.
Overall Score (100%)
|Computer Associates eTrust PestPatrol Anti-Spyware Corporate Edition r5||7.0||9.0||8.0||6.0||7.0|
|Eset NOD32 2.5 Antivirus System||7.0||7.0||7.0||9.0||7.0|
|F-Secure Anti-Virus Client Security 6||9.0||9.0||10.0||9.0||8.0|
|LANDesk Security Suite 8.6||8.0||8.0||9.0||10.0||8.0|
|McAfee VirusScan Enterprise 8.0 with Anti-Spyware Enterprise Module 8.0||8.0||8.0||8.0||10.0||8.0|
|Sunbelt CounterSpy Enterprise 1.5||9.0||9.0||8.0||9.0||9.0|
|SurfControl Enterprise Protection Suite - Enterprise Threat Shield||8.0||9.0||8.0||8.0||9.0|
|Tenebril SpyCatcher 4.0 Beta|
|Trend Micro Anti-Spyware for Small and Medium Business 3.0||8.0||9.0||8.0||8.0||8.0|
|Webroot Spy Sweeper Enterprise 2.5||8.0||9.0||9.0||8.0||9.0|
You may still be better off sticking with Win7 or Win8.1, given the wide range of ongoing Win10...
Early results look promising: the many-hours-long Win7 waits may be behind us
Now that we're down to the wire, many upgraders report that the installer hangs. If this happens to...
Hello, computer: Hands-free computing a la 'Star Trek' is coming soon
Looking for a job in tech or planning to make a career change? Here is CareerCast's list of the top 10...
A new report pulls back the curtain and reveals the ‘Wild West’ of unrestricted facial recognition...
APT group FruityArmor exploited Windows GDI memory handling to break out of browser sandboxes and...