Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.
While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.
The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.
Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.
Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?
As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.