Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Two-month wait for government POODLE patch

Two-month wait for government POODLE patch

Almost two months after Google's security team revealed a major security flaw in SSLv3, an Australian government department was found to still be using the old protocol on at least one of its websites, leaving it wide open to POODLE-like attacks.

published December 11, 2014 by

Comments

Google Mini

Google Mini

The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.

published April 3, 2006 by

Comments

Network Box SME 250

Network Box SME 250

Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.

published February 13, 2006 by

Comments

MailFrontier Gateway Appliance M500

MailFrontier Gateway Appliance M500

The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.

published December 21, 2005 by

Comments

ZyXEL ZyWALL 35 UTM

ZyXEL ZyWALL 35 UTM

The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.

published November 24, 2005 by

Comments

Check Point Connectra 2.0

Check Point Connectra 2.0

Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.

published October 9, 2005 by

Comments

Blue Coat Spyware Interceptor

Blue Coat Spyware Interceptor

Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.

published September 12, 2005 by

Comments

ISS Proventia M10

ISS Proventia M10

The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.

published July 26, 2005 by

Comments

F5 FirePass 4100

F5 FirePass 4100

This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.

published February 28, 2005 by

Comments

Check Point InterSpect 610

Check Point InterSpect 610

Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.

published January 10, 2005 by

Comments

IronPort C60

IronPort C60

This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.

published November 19, 2004 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories