dcsimg

Drew Robb - Article Archives - Page 4

Trend Micro Tipping Point: IDPS Product Overview and Analysis

February 20, 2018
We review Trend Micro's intrusion prevention solution, which blocks malicious traffic at up to 120 Gbps while providing comprehensive threat intelligence.
READ MORE

Hillstone NIPS: IDPS Product Overview and Analysis

February 20, 2018
We review Hillstone's intrusion prevention system, which offers anti-virus, application control, advanced threat detection, abnormal behavior detection and a cloud sandbox.
READ MORE

NSFocus IPS: IDPS Product Overview and Analysis

February 20, 2018
We review NSFocus NGIPS, an intrusion prevention system that blocks known, zero-day, and advanced persistent threats.
READ MORE

H3C IPS: IDPS Product Overview and Analysis

February 20, 2018
We review the H3C SecBlade IPS, an intrusion prevention module for H3C switches and routers with self-learning capabilities.
READ MORE

Huawai Network Intelligent Protection: IDPS Product Overview and Analysis

February 20, 2018
We review Huawei Network Intelligent Protection (NIP), an intrusion prevention solution that employs anomaly and heuristic detection.
READ MORE

Entrust IoTrust Identity and Data Security: IDPS Product Overview and Analysis

February 20, 2018
We review Entrust IoTrust Identity and Data Security, an intrusion prevention system that establishes trusted identities for devices across IoT infrastructures.
READ MORE

10 Top Patch Management Solutions

January 19, 2018
Patch management might be the single most important security tool. We review 10 of the top patch management solutions.
READ MORE

SolarWinds Patch Manager: Overview and Analysis

January 19, 2018
We review SolarWinds Patch Manager, a patch management solution focused on Windows servers and workstations and third-party products.
READ MORE

Flexera Corporate Software Inspector: Overview and Analysis

January 19, 2018
We review Flexera Corporate Software Inspector, a patch management solution for Windows, Mac OS and Red Hat Linux.
READ MORE

IBM BigFix: Patch Management Overview and Analysis

January 19, 2018
We review IBM BigFix, a patch management solution for Windows, Mac, Unix and Linux operating systems and applications.
READ MORE

Ivanti Patch: Patch Management Overview and Analysis

January 19, 2018
We review Ivanti Patch, a range of patch management solutions for small companies through large enterprises.
READ MORE

Red Hat Satellite: Patch Management Overview and Analysis

January 19, 2018
We review Red Hat Satellite, a patch management solution for enterprise Linux systems.
READ MORE

Kaseya VSA Software Management: Patch Management Overview and Analysis

January 19, 2018
We review Kaseya VSA Software Management module, a patch management solution for Mac and Windows operating systems.
READ MORE

Micro Focus ZENworks Patch Management: Overview and Analysis

January 19, 2018
We review Micro Focus ZENworks Patch Management, which manages patches for Mac, Linux, Windows and other operating systems.
READ MORE

Verismic CMS Patch Manager: Overview and Analysis

January 19, 2018
We review Verismic CMS Patch Manager, a patch management solution for Microsoft, Linux, and third-party applications.
READ MORE

BMC BladeLogic Server Automation: Patch Management Overview and Analysis

January 19, 2018
We review BMC BladeLogic Server Automation, a server configuration tool that also offers patch management for Microsoft, Linux, and other OSes.
READ MORE

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

January 4, 2018
2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.
READ MORE

Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy

September 6, 2017
Deception technology is becoming a critical IT security defense strategy. We outline how deception tools work and the vendors to watch.
READ MORE

Top 10 Enterprise Encryption Products

August 15, 2017
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.
READ MORE