Security Buying Guides - Article Archives - Page 6

How Big Data Analytics Can Boost Network Security

August 26, 2013 |

While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.

READ MORE

BYOD Fuels NAC Comeback

April 11, 2013 |

The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.

READ MORE

Review: Malwarebytes Enterprise Edition

October 24, 2012 |

Malwarebytes Enterprise Edition detects and removes malware, removing all traces after a system has been infected, a capability that is likely to be especially important to small businesses.

READ MORE

Review: Microsoft System Center 2012 Endpoint Protection

September 25, 2012 |

While Microsoft System Center 2012 Endpoint Protection offers deployment and management convenience, its anti-malware engine is weak in comparison to competitors.

READ MORE

Review: McAfee Deep Defender

August 23, 2012 |

Rootkits are in the crosshairs of this innovative anti-malware technology that runs directly on the processor, underneath the operating system.

READ MORE

Biometric Authentication: How It Works

August 18, 2012 |

Passwords are potentially the weakest link in your organization's information security systems. Biometric authentication technologies promise a more secure alternative.

READ MORE

Review: Total Defense Anti-Virus r12

August 13, 2012 |

CA Technologies spinoff Total Defense offers robust management capabilities in its AV-only product. But the software lags a bit behind the competition in anti-malware sophistication.

READ MORE

Review: Avast Endpoint Protection Suite

August 09, 2012 |

Multiple levels of anti-malware protection combined with a community-based threat detection network and a centralized management server make Avast a compelling alternative for business-level virus protection.

READ MORE

Top 20 Android Security Apps

June 28, 2012 |

Protect your Android device against malicious apps, mobile malware, and theft with these essential security solutions.

READ MORE

Top 3 Insecure Password Management Practices

June 22, 2012 |

Even good admins sometimes do bad things with passwords. Spotting these risky IT practices in your organization is a first step to a more secure password management strategy.

READ MORE

Full Disk Encryption Buyer's Guide

May 10, 2012 |

Full disk encryption lessens the odds of suffering a data breach when corporate laptops go missing or are left unattended.

READ MORE

8 Steps to a Secure Cloud Initiative

April 26, 2012 |

Security should be built into your cloud deployment, not added on.

READ MORE

Review: McAfee Endpoint Protection Suite

April 18, 2012 |

In addition to its traditional malware detection capabilities, McAfee's Endpoint Protection Suite offers some useful extra components, including a firewall.

READ MORE

4 Steps to Securing Mobile Devices and Apps in the Workplace

April 09, 2012 |

Is your company prepared to manage the risks introduced by the BYOD (Bring Your Own Device) trend? Here's how to review and strengthen your organization's mobile security posture.

READ MORE

Review: ESET NOD32 Antivirus 4 Business Edition

March 14, 2012 |

Organizations looking for high-performance malware protection without a lot of extra bells and whistles should take a close look at the business edition in ESET's antivirus product line.

READ MORE

Review: Panda Cloud Office Protection

February 01, 2012 |

For small to midsize businesses, cloud-based endpoint security management can be a compelling alternative to running an on-premise antivirus management server.

READ MORE

Sourcefire FireAMP Brings Big Data Analytics to Enterprise Security

January 28, 2012 |

Large data sets offer new ways to track malware across a network.

READ MORE

Evaluating the Security of Sliced Data Storage in the Cloud

December 14, 2011 |

Can you trust your company's data to remain secure when it's sliced and dispersed to a storage cloud running on unknown hardware? The answer may surprise you.

READ MORE

Review: Sophos Endpoint Security

November 21, 2011 |

Focused solely on business customers, Sophos is made for small to midsize organizations.

READ MORE

Up in the Cloud: Debating How to Secure iOS 5

November 15, 2011 |

iOS device level security really isn't an option but cloud-based network monitoring might be the way to go.

READ MORE