June 20, 2005

Clamp down on security leaks

The InfoWorld Test Center scrutinizes solutions from iLumin, Reconnex, Tablus, Vericept, and Vontu aimed at stopping insiders from spilling your secrets or breaking the law

June 20, 2005

Securing data at the point of use

Protecting data at the desktop keeps it from slipping out via removable storage, printers, and other means

June 6, 2005

StealthWatch Xe shines a light on NetFlows

New Lancope appliance collects and analyzes NetFlow traffic data for anomalous behavior

May 2, 2005

Feed the monitoring multitudes

Gigamon's network data access switch steers your links to your analyzers

March 28, 2005

How to hire an IT security consultant

Relying on the three Ts can help: thoroughness, timing, and trust

March 28, 2005

The CTO's perspective

Kevin Bernstein, CTO of Platinum Capital Group, puts prospective security consultants under close scrutiny 

March 28, 2005

The consultant's view

Steve Manzuik, an independent IT security consultant, emphasizes experience, expertise, and reputation

March 18, 2005

GreenBorder cages malware

Unique approach to desktop security -- allowing content to execute in virtual space -- requires accepting a measure of risk

March 18, 2005

Managing security in a compliance-crazy world

Products from eSecurity, nCircle, eEye, Enterasys, and NetIQ ease documentation burden

March 11, 2005

Secure architectures

Enterprises are increasingly designing security into every aspect of their systems from the get-go, rather than retroactively

©1994-2014 Infoworld, Inc.