Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

RSA 2015 Expo: Best in Show

RSA 2015 Expo: Best in Show

The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.

April 22, 2015 by in Security

Trend Micro InterScan Gateway Security Appliance

Trend Micro InterScan Gateway Security Appliance

Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.

September 5, 2007 by in Security

SmoothWall SmoothGuard 1000-UTM

SmoothWall SmoothGuard 1000-UTM

By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.

July 25, 2007 by in Security

Fortinet FortiGate-224B

Fortinet FortiGate-224B

Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.

May 30, 2007 by in Security

Symantec Backup Exec 11d

Symantec Backup Exec 11d

Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.

April 2, 2007 by in Security

Billion Electric BiGuard S10

Billion Electric BiGuard S10

This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.

November 22, 2006 by in Security

Google Mini

Google Mini

The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.

April 3, 2006 by in Security

Network Box SME 250

Network Box SME 250

Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.

February 13, 2006 by in Security

MailFrontier Gateway Appliance M500

MailFrontier Gateway Appliance M500

The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.

December 21, 2005 by in Security

ZyXEL ZyWALL 35 UTM

ZyXEL ZyWALL 35 UTM

The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.

November 24, 2005 by in Security

Check Point Connectra 2.0

Check Point Connectra 2.0

Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.

October 9, 2005 by in Security

LG F1200

LG F1200

LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.

October 4, 2005 by in Mobility

Blue Coat Spyware Interceptor

Blue Coat Spyware Interceptor

Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.

September 12, 2005 by in Security

Most Popular